[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 18 Apr 2019 04:00:06 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/04/18 04:00:05
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.407&r2=1.408
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.503&r2=1.504
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.68&r2=1.69
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- de.po 17 Apr 2019 10:00:16 -0000 1.68
+++ de.po 18 Apr 2019 08:00:02 -0000 1.69
@@ -5391,6 +5391,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- es.po 17 Apr 2019 14:31:38 -0000 1.92
+++ es.po 18 Apr 2019 08:00:02 -0000 1.93
@@ -4034,6 +4034,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- fr.po 17 Apr 2019 10:46:13 -0000 1.120
+++ fr.po 18 Apr 2019 08:00:02 -0000 1.121
@@ -4373,6 +4373,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- it.po 17 Apr 2019 10:00:16 -0000 1.68
+++ it.po 18 Apr 2019 08:00:02 -0000 1.69
@@ -5049,6 +5049,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- ja.po 17 Apr 2019 10:00:17 -0000 1.68
+++ ja.po 18 Apr 2019 08:00:02 -0000 1.69
@@ -4351,6 +4351,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-google.de-diff.html 26 Mar 2019 10:33:48 -0000 1.23
+++ malware-google.de-diff.html 18 Apr 2019 08:00:02 -0000 1.24
@@ -313,28 +313,36 @@
<h3 id="surveillance">Google Surveillance</h3>
<span class="removed"><del><strong><ul>
- <li><p>Tracking software</strong></del></span>
+ <li><p>Tracking software in popular</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of</em></ins></span> Android <span
class="removed"><del><strong>apps is pervasive</strong></del></span> <span
class="inserted"><ins><em>phones,</em></ins></span> and sometimes <span
class="removed"><del><strong>very clever. Some trackers
can</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use</em></ins></span>
in <span class="removed"><del><strong>popular Android
apps</strong></del></span> <span class="inserted"><ins><em>their
+ let Google monitor their phone use, and all internet use in their
homes, for an extravagant payment of $20</a>.</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>not a malicious functionality of a program with some
other
- purpose; this is the software's sole purpose,</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</strong></del></span> <span class="inserted"><ins><em>Google says
so. But
- Google says it in</em></ins></span> a <span class="inserted"><ins><em>way
that encourages most people to ignore the
+ <p>This is not</em></ins></span> a <span
class="removed"><del><strong>user's movements around</strong></del></span>
<span class="inserted"><ins><em>malicious functionality of</em></ins></span> a
<span class="removed"><del><strong>physical store</strong></del></span> <span
class="inserted"><ins><em>program with some other
+ purpose; this is the software's sole purpose, and Google says so. But
+ Google says it in a way that encourages most people to ignore the
details. That, we believe, makes it fitting to list here.</p>
</li>
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the</em></ins></span> user's <span
class="removed"><del><strong>movements around a physical
store</strong></del></span> <span class="inserted"><ins><em>location even when
users disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
<p>There are other ways to turn off the other kinds of location
@@ -379,12 +387,10 @@
<li id="M201609210">
<p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></em></ins></span>
+ all conversations</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140">
+ <li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
@@ -393,10 +399,12 @@
disable Google Play itself to completely stop the tracking. This is
yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507280">
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507280">
<p>Google Chrome makes it easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do
so.</p>
@@ -599,7 +607,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/04/18 08:00:02 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-google.de.po 26 Mar 2019 10:33:48 -0000 1.38
+++ malware-google.de.po 18 Apr 2019 08:00:02 -0000 1.39
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -631,6 +631,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-google.es.po 26 Mar 2019 12:51:43 -0000 1.5
+++ malware-google.es.po 18 Apr 2019 08:00:02 -0000 1.6
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-03-26 13:32+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -482,6 +483,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-google.fr.po 31 Mar 2019 11:07:09 -0000 1.62
+++ malware-google.fr.po 18 Apr 2019 08:00:03 -0000 1.63
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-03-31 13:02+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -485,6 +486,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-google.pot 26 Mar 2019 10:33:48 -0000 1.34
+++ malware-google.pot 18 Apr 2019 08:00:03 -0000 1.35
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -345,6 +345,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a "
"href=\"https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss\">
"
"let Google monitor their phone use, and all internet use in their homes, for "
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- malware-google.ru.po 26 Mar 2019 18:00:34 -0000 1.81
+++ malware-google.ru.po 18 Apr 2019 08:00:03 -0000 1.82
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2018-10-05 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -482,6 +483,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- nl.po 17 Apr 2019 10:00:17 -0000 1.68
+++ nl.po 18 Apr 2019 08:00:03 -0000 1.69
@@ -3583,6 +3583,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- pl.po 17 Apr 2019 10:00:17 -0000 1.68
+++ pl.po 18 Apr 2019 08:00:03 -0000 1.69
@@ -3095,6 +3095,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- pot 17 Apr 2019 10:00:17 -0000 1.68
+++ pot 18 Apr 2019 08:00:03 -0000 1.69
@@ -2931,6 +2931,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-surveillance.de-diff.html 9 Apr 2019 08:00:49 -0000
1.61
+++ proprietary-surveillance.de-diff.html 18 Apr 2019 08:00:03 -0000
1.62
@@ -777,6 +777,15 @@
</div>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
@@ -3361,7 +3370,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 08:00:49 $
+$Date: 2019/04/18 08:00:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary-surveillance.de.po 9 Apr 2019 08:00:49 -0000 1.276
+++ proprietary-surveillance.de.po 18 Apr 2019 08:00:03 -0000 1.277
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1544,6 +1544,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.407
retrieving revision 1.408
diff -u -b -r1.407 -r1.408
--- proprietary-surveillance.fr.po 9 Apr 2019 17:33:06 -0000 1.407
+++ proprietary-surveillance.fr.po 18 Apr 2019 08:00:03 -0000 1.408
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-04-09 19:31+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1115,6 +1116,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-surveillance.it-diff.html 9 Apr 2019 08:00:49 -0000
1.128
+++ proprietary-surveillance.it-diff.html 18 Apr 2019 08:00:03 -0000
1.129
@@ -871,39 +871,49 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>According</strong></del></span>
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them to
turn</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span> <span class="inserted"><ins><em>sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has</em></ins></span> to <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="inserted"><ins><em>to Google.</p>
+ </li>
+
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what</em></ins></span> the <span class="removed"><del><strong>phones
- on and</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ <p>Facebook's app got “consent” to <a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201711210">
- <p>Android tracks location for Google <a
+ <p>Android tracks</em></ins></span> location <span
class="inserted"><ins><em>for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+ tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
<span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
<span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
@@ -957,141 +967,91 @@
<p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>on the user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>to
Motorola</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
- <span class="inserted"><ins><em><li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data
in</strong></del></span>
+ <li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ listens for voice all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the</strong></del></span>
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>personal details
of users that install</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>“consent”</em></ins></span> of <span
class="removed"><del><strong>spyware</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> is
- <span class="removed"><del><strong>still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller
application</strong></del></span> not <span class="removed"><del><strong>only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
+ <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span>
- <span class="inserted"><ins><em>hiding it</em></ins></span> in <span
class="removed"><del><strong>the phone,</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
+ honestly identify the information it collects on users,
instead</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent
Google</em></ins></span>
- and <span class="inserted"><ins><em>other companies from getting this
personal information</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> the <span
class="removed"><del><strong>user's consent”
- for</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general</em></ins></span> surveillance <span
class="removed"><del><strong>is inadequate</strong></del></span> <span
class="inserted"><ins><em>package such</em></ins></span> as <span
class="removed"><del><strong>a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>Carrier IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance,
judging</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em><a
+ <p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
+ the e-reader used</em></ins></span> by <span
class="inserted"><ins><em>most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ send lots of</em></ins></span> data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets
when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"></em></ins></span>
they <span class="removed"><del><strong>use its search engine.</p>
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span class="inserted"><ins><em>report even which page</em></ins></span>
the user <span class="removed"><del><strong>must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1109,43 +1069,32 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="removed"><del><strong>realize that it</strong></del></span> <span
class="inserted"><ins><em>identify who</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>running it</a>. The result</em></ins></span> is
- <span class="inserted"><ins><em>often</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span> <span
class="inserted"><ins><em>legal threat demanding a lot</em></ins></span> of
- <span class="removed"><del><strong>the attitude</strong></del></span>
<span class="inserted"><ins><em>money.</p>
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
- <p>The fact that this is used for repression</em></ins></span> of
<span class="removed"><del><strong>the proprietary</strong></del></span> <span
class="inserted"><ins><em>forbidden sharing
- makes it even more vicious.</p>
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
- <p>This illustrates that making unauthorized copies of
nonfree</em></ins></span> software <span class="removed"><del><strong>industry
towards
- those they have subjugated.</p>
+ <p>The fact that this is used for repression of forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- is <span class="removed"><del><strong>doing this in</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
- <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1155,273 +1104,315 @@
<ul class="blurbs">
<li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps</strong></del></span>
<span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree</em></ins></span> apps <span
class="removed"><del><strong>snoop on the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>that have
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data
without
+ preinstalled nonfree apps</em></ins></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
+ </li>
+
+ <li><p>Facebook's new Magic Photo app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take
according</strong></del></span> <span class="inserted"><ins><em>have
access</em></ins></span> to <span class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>sensitive
data without
users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>snooping done
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to
user-installed apps that have access to</em></ins></span>
- the <span class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>network but no direct
access to</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data. This results</em></ins></span> in <span
class="inserted"><ins><em>massive
- surveillance on which</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
+ the <span class="removed"><del><strong>frame.</p>
- <p>Don't be distracted by the question of whether the app
developers get
- users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>control.</p></em></ins></span>
- </li>
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>data, or pass it on</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have</em></ins></span>
access to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span>
+ the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to <span class="removed"><del><strong>be
+ sent across</strong></del></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>has absolutely no control.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which
can</em></ins></span> use <span class="removed"><del><strong>by
companies.</a></p>
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19
of</em></ins></span> them <span class="inserted"><ins><em><a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>the service.</p>
+ </li>
- <p>The FTC criticized this app because</strong></del></span> it
<span class="removed"><del><strong>asked the</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever</em></ins></span> user <span
class="inserted"><ins><em>“consent” is sought, it is buried in
- lengthy terms of service that are difficult</em></ins></span> to
- <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
+ 2015</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong><a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and
some</strong></del></span> <span class="inserted"><ins><em>is buried in
+ lengthy terms of service that</em></ins></span> are <span
class="removed"><del><strong>starting</strong></del></span> <span
class="inserted"><ins><em>difficult</em></ins></span> to <span
class="removed"><del><strong>realize that it</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize snooping.</p>
</li>
<li id="M201902230">
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data to <span
class="removed"><del><strong>the app developer but did</strong></del></span>
<span class="inserted"><ins><em>Facebook</a>. Lots of companies built
apps that
- way and released them, apparently</em></ins></span> not
- <span class="removed"><del><strong>ask about sending
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the
personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>other companies. This</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It</em></ins></span> shows <span class="inserted"><ins><em>that
no one can trust a nonfree program, not even</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span>
- <span class="inserted"><ins><em>developers</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
+ library for building mobile apps, which also</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>they present
snooping as a</strong></del></span>
+ way
+ <span class="removed"><del><strong>to “serve” users
better</a>—never mind
+ whether</strong></del></span> <span class="inserted"><ins><em>and
released them, apparently not realizing that all the personal
+ data</em></ins></span> they <span class="removed"><del><strong>want that.
This is</strong></del></span> <span class="inserted"><ins><em>collected would
go to Facebook as well.</p>
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span>
+ <span class="inserted"><ins><em>developers</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ those they have subjugated.</p>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span class="removed"><del><strong>then
sends</strong></del></span>
- <span class="inserted"><ins><em>misuse users'</em></ins></span> personal
<span class="removed"><del><strong>data about them to
- nVidia servers</a>.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Many
proprietary</strong></del></span>
- <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android</em></ins></span> apps
<span class="removed"><del><strong>for mobile devices
report</strong></del></span> <span class="inserted"><ins><em>use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of</em></ins></span> which <span
class="removed"><del><strong>other
+ apps</strong></del></span> <span class="inserted"><ins><em>24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>user has
+ installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other</em></ins></span> companies, and <span
class="inserted"><ins><em><a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23% of the total) link</em></ins></span> this <span
class="removed"><del><strong>in a way</strong></del></span> <span
class="inserted"><ins><em>ID to hardware identifiers</a>,
+ so</em></ins></span> that <span class="removed"><del><strong>at
least</strong></del></span> <span class="inserted"><ins><em>users cannot escape
tracking by resetting it.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="removed"><del><strong>too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what the others do.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed, was</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>no
hurry</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>toys
with</strong></del></span> <span class="inserted"><ins><em>policies
of</em></ins></span> a <span class="removed"><del><strong>mobile phone. This
would
- enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree software developers from including
malware</em></ins></span> in <span
class="removed"><del><strong>on</strong></del></span>
- <span class="inserted"><ins><em>their programs.</p>
+ <li><p>FTC says most mobile</strong></del></span> <span
class="inserted"><ins><em>in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
- into</strong></del></span> <span class="inserted"><ins><em>surveillance
feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting with
the app.</p></em></ins></span>
+ <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
<span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be</em></ins></span> on <span class="removed"><del><strong>its users
through the proprietary control app</a>.</p>
-
- <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead</em></ins></span> of <span
class="inserted"><ins><em>“beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
+ <p>Twenty nine “beauty camera” apps
that</em></ins></span> used <span class="inserted"><ins><em>to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads</em></ins></span> on <span
class="inserted"><ins><em>users, and redirecting
them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them</em></ins></span> was
<span class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>designed to make uninstallation
+ the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>user interface of
most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>person's
- body), as well as the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way of knowing what they really do.</p>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there</em></ins></span> is <span class="inserted"><ins><em>no easy way of
knowing what they really do.</p>
</li>
<li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play found that <a
+ <p>An investigation of the 150 most popular
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>usersâ
privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive
advertising—that</em></ins></span> could <span
class="removed"><del><strong>have
- checked and changed.</p>
-
- <p>The company</strong></del></span>
- <span class="inserted"><ins><em>potentially also be used to spy on users.
Other technical flaws were
+ 25% fail</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>the
+ phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>their
+ source code—often used for invasive advertising—that could
+ potentially also</em></ins></span> be <span
class="removed"><del><strong>distracted by the question</strong></del></span>
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>how
- people used it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+
href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>whether</strong></del></span>
+ the <span class="removed"><del><strong>app developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
+
+ <p>It</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
</li>
<li id="M201901050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Weather Channel app <a
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span class="removed"><del><strong>because it
asked the user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the</em></ins></span> company's <span
class="removed"><del><strong>statement</strong></del></span> <span
class="inserted"><ins><em>server</a>. The company is
- being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>was anonymizing</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
- with</em></ins></span> the data <span class="removed"><del><strong>broker
would have been able to figure out
- who</strong></del></span> <span class="inserted"><ins><em>is a secondary
issue. The principal wrong here is that</em></ins></span>
- the <span class="removed"><del><strong>user was.</p>
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>app developer but did not
+ ask about sending it to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="inserted"><ins><em>what it will do
+ with</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p>
+ </li>
+</ul>
+
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
+ with the</em></ins></span> data <span class="removed"><del><strong>about
them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ tracking people's locations.</p></em></ins></span>
</li>
- <li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
<span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>company
has been ordered</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>pay a
total</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ report on</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
+ Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's</strong></del></span> <span class="inserted"><ins><em>obtains
from the same machine via
+ various apps. Some of them send Facebook detailed</em></ins></span>
information <span class="removed"><del><strong>on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More</strong></del></span> about <span class="removed"><del><strong>NSA
app spying</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based</strong></del></span>
+ <span class="inserted"><ins><em>the user's activities</em></ins></span> in
the <span class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into</strong></del></span> <span class="inserted"><ins><em>user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
+ <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
account.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>phones of users
that have deleted them</a>.</p>
+ track</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which</strong></del></span>
users <span class="removed"><del><strong>could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span> that <span
class="removed"><del><strong>made the vibrator</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ record</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
- tracking, but most users will be tricked</em></ins></span> by the <span
class="removed"><del><strong>manufacturer's snooping.</p>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker,</strong></del></span> <span class="inserted"><ins><em>turn
off</em></ins></span> the <span class="removed"><del><strong>data broker would
have been able to figure out
+ who</strong></del></span> <span class="inserted"><ins><em>other kinds of
location
+ tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
- <p>That</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span class="inserted"><ins><em>user's movements
and listens through the microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from the article.</p>
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
+ a <span class="removed"><del><strong>total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>recording.
But I can't be sure from the article.</p>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>care much less about sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
</li>
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>adults</a>.</p>
+ of</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>5,855 Android apps studied by researchers
were</em></ins></span> found <span class="removed"><del><strong>a
way</strong></del></span> to <span class="removed"><del><strong>access the
data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="inserted"><ins><em>collect information about its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>children and adults</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span class="inserted"><ins><em>these proprietary apps whose
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -1885,12 +1876,9 @@
<div class="big-section">
<h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
-
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-<span class="inserted"><ins><em><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul class="blurbs">
<li id="M201708280">
@@ -1932,7 +1920,7 @@
settings unchanged.</p>
<p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
+ matter), the easiest way to make</em></ins></span> sure <span
class="inserted"><ins><em>it isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
@@ -2003,10 +1991,9 @@
</li>
<li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>even what they wanted to
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
record</a>.</p>
</li>
@@ -2066,22 +2053,13 @@
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>patch to
stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -2091,64 +2069,93 @@
Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
+<li><p></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+
+ <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
+ at <span class="removed"><del><strong>Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
+ <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span> <span class="inserted"><ins><em>the
videos. That's not
security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
@@ -3095,7 +3102,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 08:00:49 $
+$Date: 2019/04/18 08:00:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary-surveillance.it.po 9 Apr 2019 08:00:49 -0000 1.289
+++ proprietary-surveillance.it.po 18 Apr 2019 08:00:03 -0000 1.290
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1499,6 +1499,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary-surveillance.ja-diff.html 9 Apr 2019 08:00:49 -0000
1.138
+++ proprietary-surveillance.ja-diff.html 18 Apr 2019 08:00:03 -0000
1.139
@@ -795,39 +795,48 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>According</strong></del></span>
+ <li><p>According to Edward Snowden,</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and
sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
by sending hidden text messages which enable them to
turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what</em></ins></span> the <span class="removed"><del><strong>phones
- on and</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the <span class="removed"><del><strong>phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
+
+ <p>Nonfree software in the phone has</em></ins></span> to <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="inserted"><ins><em>to Google.</p>
+ </li>
+
+ <li id="M201812060">
+ <p>Facebook's app got “consent” to <a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201711210">
- <p>Android tracks location for Google <a
+ <p>Android tracks</em></ins></span> location <span
class="inserted"><ins><em>for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+ tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
<span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
<span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
@@ -881,20 +890,26 @@
<p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other
people's</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola</em></ins></span> phone
- <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
<span class="inserted"><ins><em><a
+ <p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
<div class="big-subsection">
@@ -904,18 +919,13 @@
<ul>
- <li><p>The Uber</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>ride</a>.</p>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span> <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>personal
details of users that install</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+ <p>This example illustrates how
“getting</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a
protection against massive
+ <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>“consent” of users</em></ins></span> is
<span class="removed"><del><strong>inadequate as a protection against massive
surveillance.</p>
</li>
@@ -985,7 +995,9 @@
report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1003,13 +1015,12 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some
- are starting to realize</strong></del></span> <span
class="inserted"><ins><em>running it</a>. The result is
+ are starting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
<p>The fact</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> is <span
class="removed"><del><strong>nasty.</p></strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
@@ -1063,24 +1074,24 @@
<span class="inserted"><ins><em><li id="M201902230">
<p>Facebook offered a convenient proprietary
- library</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ library</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies
built</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company, and perhaps by the OS in the
+ sent personal data</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS in the
phone.</p>
- <p>Don't be distracted by the question of whether the
app</strong></del></span>
- developers <span class="removed"><del><strong>get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>of
other nonfree programs.</p></em></ins></span>
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>companies built apps that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That
is</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
+
+ <p>It shows that</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>one
can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
@@ -1109,46 +1120,45 @@
“solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
+ app would not.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>interacting
with the app.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p></em></ins></span>
</li>
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads
on users, and redirecting</em></ins></span>
- them to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <span class="removed"><del><strong><li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>user interface
of most of them was designed</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>make uninstallation
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
@@ -1223,14 +1233,13 @@
minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>is surrounded by a person's
body), and the vibration frequency.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make
statements</strong></del></span> <span class="inserted"><ins><em>same machine
via
- various apps. Some of them send Facebook detailed
information</em></ins></span> about
- <span class="removed"><del><strong>their products,
rather</strong></del></span>
- <span class="inserted"><ins><em>the user's activities in the app; others
only say that the user is
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
+ <p>This spying occurs regardless of whether the user
has</em></ins></span> a <span class="removed"><del><strong>labeling
+ standard with which manufacturers would make
statements</strong></del></span> <span class="inserted"><ins><em>Facebook
account.</p>
</li>
@@ -1260,7 +1269,8 @@
<p>I expect it implements DRM, too—that there is no way to save
a recording. But I can't be sure from the article.</p>
- <p>If you learn to care much less about sports, you will benefit in
+ <p>If you learn to care much less</em></ins></span> about
+ <span class="removed"><del><strong>their products,
rather</strong></del></span> <span class="inserted"><ins><em>sports, you will
benefit in
many ways. This is one more.</p>
</li>
@@ -1288,16 +1298,17 @@
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"></em></ins></span>
which users <span class="removed"><del><strong>can check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>are HIV-positive, then provides the information to
+ and change.</p>
+ </li>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each
- other but not to the server's database.</p></em></ins></span>
+ other but not to the server's database.</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li id="M201803050">
+ <li id="M201803050">
<p>The moviepass app and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
@@ -2930,7 +2941,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 08:00:49 $
+$Date: 2019/04/18 08:00:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary-surveillance.ja.po 9 Apr 2019 08:00:49 -0000 1.262
+++ proprietary-surveillance.ja.po 18 Apr 2019 08:00:03 -0000 1.263
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1225,6 +1225,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary-surveillance.pot 9 Apr 2019 08:00:49 -0000 1.210
+++ proprietary-surveillance.pot 18 Apr 2019 08:00:03 -0000 1.211
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -802,6 +802,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a "
"href=\"https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent\">
"
"upload call logs automatically from Android phones</a> while disguising what "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.503
retrieving revision 1.504
diff -u -b -r1.503 -r1.504
--- proprietary-surveillance.ru.po 9 Apr 2019 09:30:43 -0000 1.503
+++ proprietary-surveillance.ru.po 18 Apr 2019 08:00:03 -0000 1.504
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1102,6 +1103,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.de-diff.html 17 Apr 2019 10:00:17 -0000 1.77
+++ proprietary.de-diff.html 18 Apr 2019 08:00:03 -0000 1.78
@@ -127,9 +127,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -185,6 +185,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
@@ -233,16 +242,6 @@
The only way it can deserve rational trust is if the software is
free.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
</ul></em></ins></span>
@@ -303,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.de.po 17 Apr 2019 10:00:17 -0000 1.119
+++ proprietary.de.po 18 Apr 2019 08:00:03 -0000 1.120
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -488,17 +501,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.es.po 17 Apr 2019 10:00:17 -0000 1.143
+++ proprietary.es.po 18 Apr 2019 08:00:03 -0000 1.144
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -307,6 +307,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -387,25 +400,6 @@
"serÃan peligrosos. Pero ¿podemos confiar en esa afirmación? La única
manera "
"de que mereciera una confianza razonable serÃa que el software fuera libre."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Muchos teléfonos Android vienen con gran cantidad de <a href=\"https://"
-"elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\">aplicaciones "
-"privativas que tienen acceso a datos sensibles sin el conocimiento de los "
-"usuarios</a>. Estas aplicaciones ocultas pueden enviar los datos a sus "
-"desarrolladores, o bien pasárselos a aplicaciones instaladas por el usuario "
-"que tienen acceso a la red pero no acceso directo a los datos. El resultado "
-"es una vigilancia masiva sobre la que el usuario no tiene ningún control en "
-"absoluto."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +479,24 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais."
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Muchos teléfonos Android vienen con gran cantidad de <a href=\"https://"
+#~ "elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"
+#~ "\">aplicaciones privativas que tienen acceso a datos sensibles sin el "
+#~ "conocimiento de los usuarios</a>. Estas aplicaciones ocultas pueden "
+#~ "enviar los datos a sus desarrolladores, o bien pasárselos a aplicaciones "
+#~ "instaladas por el usuario que tienen acceso a la red pero no acceso "
+#~ "directo a los datos. El resultado es una vigilancia masiva sobre la que "
+#~ "el usuario no tiene ningún control en absoluto."
+
+#~ msgid ""
#~ "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
#~ "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
#~ "contacts.html\"> when they go to a junkyard the driver's personal data "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.fr.po 17 Apr 2019 10:46:13 -0000 1.175
+++ proprietary.fr.po 18 Apr 2019 08:00:03 -0000 1.176
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-04-17 12:45+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -385,25 +399,6 @@
"seule chose qui lui ferait mériter notre confiance éclairée serait que son
"
"logiciel soit libre."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Un grand nombre de téléphones sous Android sont livrés avec une quantité "
-"énorme d'<a href=\"https://elpais.com/elpais/2019/03/22/"
-"inenglish/1553244778_819882.html\">applis non libres préinstallés qui ont "
-"accès à des données sensibles à l'insu de l'utilisateur</a>. Ces applis "
-"cachées peuvent envoyer ces données à leur développeur, ou bien les "
-"transmettre à des applis installées par l'utilisateur, ayant accès à "
-"Internet mais pas d'accès direct aux données. Il en résulte une
surveillance "
-"massive que l'utilisateur n'a absolument aucun moyen de contrôler."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -477,3 +472,22 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais."
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Un grand nombre de téléphones sous Android sont livrés avec une
quantité "
+#~ "énorme d'<a href=\"https://elpais.com/elpais/2019/03/22/"
+#~ "inenglish/1553244778_819882.html\">applis non libres préinstallés qui
ont "
+#~ "accès à des données sensibles à l'insu de l'utilisateur</a>. Ces
applis "
+#~ "cachées peuvent envoyer ces données à leur développeur, ou bien les "
+#~ "transmettre à des applis installées par l'utilisateur, ayant accès à "
+#~ "Internet mais pas d'accès direct aux données. Il en résulte une "
+#~ "surveillance massive que l'utilisateur n'a absolument aucun moyen de "
+#~ "contrôler."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.it-diff.html 17 Apr 2019 10:00:17 -0000 1.89
+++ proprietary.it-diff.html 18 Apr 2019 08:00:03 -0000 1.90
@@ -45,10 +45,10 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
@@ -232,16 +241,6 @@
The only way it can deserve rational trust is if the software is
free.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
</ul></em></ins></span>
@@ -302,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.it.po 17 Apr 2019 10:00:17 -0000 1.128
+++ proprietary.it.po 18 Apr 2019 08:00:03 -0000 1.129
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -492,17 +505,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary.ja-diff.html 17 Apr 2019 10:00:17 -0000 1.90
+++ proprietary.ja-diff.html 18 Apr 2019 08:00:04 -0000 1.91
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -181,6 +181,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
@@ -229,16 +238,6 @@
The only way it can deserve rational trust is if the software is
free.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
</ul></em></ins></span>
@@ -299,7 +298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.ja.po 17 Apr 2019 10:00:17 -0000 1.111
+++ proprietary.ja.po 18 Apr 2019 08:00:04 -0000 1.112
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -412,17 +425,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.nl-diff.html 17 Apr 2019 10:00:17 -0000 1.89
+++ proprietary.nl-diff.html 18 Apr 2019 08:00:04 -0000 1.90
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -184,6 +184,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
@@ -232,16 +241,6 @@
The only way it can deserve rational trust is if the software is
free.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
</ul></em></ins></span>
@@ -302,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.nl.po 17 Apr 2019 10:00:17 -0000 1.100
+++ proprietary.nl.po 18 Apr 2019 08:00:04 -0000 1.101
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -485,17 +498,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.pl-diff.html 17 Apr 2019 10:00:17 -0000 1.107
+++ proprietary.pl-diff.html 18 Apr 2019 08:00:04 -0000 1.108
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
+instances of malicious functionalities (with more than 450 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -126,16 +126,16 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -182,6 +182,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
@@ -230,16 +239,6 @@
The only way it can deserve rational trust is if the software is
free.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
</ul></em></ins></span>
@@ -300,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.pl.po 17 Apr 2019 10:00:17 -0000 1.95
+++ proprietary.pl.po 18 Apr 2019 08:00:04 -0000 1.96
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -567,17 +580,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary.pot 17 Apr 2019 10:00:17 -0000 1.92
+++ proprietary.pot 18 Apr 2019 08:00:04 -0000 1.93
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a "
@@ -302,17 +315,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a "
-"href=\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\">
"
-"preinstalled nonfree apps that have access to sensitive data without users' "
-"knowledge</a>. These hidden apps may either call home with the data, or pass "
-"it on to user-installed apps that have access to the network but no direct "
-"access to the data. This results in massive surveillance on which the user "
-"has absolutely no control."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary.pt-br.po 17 Apr 2019 10:00:17 -0000 1.138
+++ proprietary.pt-br.po 18 Apr 2019 08:00:04 -0000 1.139
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-04-16 00:31-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -298,6 +298,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -380,24 +393,6 @@
"microfones não são perigosos. Mas devemos confiar nesta afirmação? A
única "
"maneira que pode merecer confiança racional é se o software for livre."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Muitos telefones Android vêm com um grande número de <a href=\"https://"
-"elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> aplicativos "
-"não livres pré-instalados que têm acesso a dados confidenciais sem o "
-"conhecimento dos usuários</a>. Esses aplicativos ocultos podem ligar para "
-"casa com os dados ou transmiti-los a aplicativos instalados pelo usuário que
"
-"tenham acesso à rede, mas sem acesso direto aos dados. Isso resulta em uma "
-"vigilância maciça na qual o usuário não tem absolutamente nenhum
controle."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +468,24 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais."
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Muitos telefones Android vêm com um grande número de <a href=\"https://"
+#~ "elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> "
+#~ "aplicativos não livres pré-instalados que têm acesso a dados "
+#~ "confidenciais sem o conhecimento dos usuários</a>. Esses aplicativos "
+#~ "ocultos podem ligar para casa com os dados ou transmiti-los a aplicativos "
+#~ "instalados pelo usuário que tenham acesso à rede, mas sem acesso direto "
+#~ "aos dados. Isso resulta em uma vigilância maciça na qual o usuário não
"
+#~ "tem absolutamente nenhum controle."
+
+#~ msgid ""
#~ "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
#~ "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
#~ "contacts.html\"> when they go to a junkyard the driver's personal data "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary.ru.po 17 Apr 2019 13:30:15 -0000 1.214
+++ proprietary.ru.po 18 Apr 2019 08:00:04 -0000 1.215
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -391,25 +405,6 @@
"ÑледÑÐµÑ Ð»Ð¸ нам довеÑÑÑÑ ÑÑÐ¾Ð¼Ñ Ð·Ð°ÑвлениÑ?
ÐдинÑÑвеннÑй ÑпоÑоб, коÑоÑÑм оно "
"Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑлÑжиÑÑ ÑазÑмное довеÑие,— ÑÑо
еÑли пÑогÑÐ°Ð¼Ð¼Ñ Ð±ÑдÑÑ ÑвободнÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Ðногие ÑелеÑÐ¾Ð½Ñ Ð½Ð° базе Android пÑодаÑÑÑÑ Ñ
болÑÑим колиÑеÑÑвом <a href="
-"\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> "
-"пÑедÑÑÑановленнÑÑ
неÑвободнÑÑ
пÑиложений, коÑоÑÑе полÑÑаÑÑ Ð´Ð¾ÑÑÑп к "
-"конÑиденÑиалÑнÑм даннÑм без ведома
полÑзоваÑелÑ</a>. ÐÑи ÑкÑÑÑÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ "
-"могÑÑ Ð»Ð¸Ð±Ð¾ оÑÑÑлаÑÑ ÑÑи даннÑе к Ñебе
домой, либо пеÑедаваÑÑ Ð¸Ñ
в "
-"пÑиложениÑ, ÑÑÑановленнÑе полÑзоваÑелем,
Ñ ÐºÐ¾ÑоÑÑÑ
еÑÑÑ Ð´Ð¾ÑÑÑп к ÑеÑи, но "
-"Ð½ÐµÑ Ð¿ÑÑмого доÑÑÑпа к даннÑм. ÐÑо пÑиводиÑ
к маÑÑовой Ñлежке, над коÑоÑой Ñ "
-"полÑзоваÑÐµÐ»Ñ Ð½ÐµÑ Ð°Ð±ÑолÑÑно никакого
конÑÑолÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -489,6 +484,24 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais."
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Ðногие ÑелеÑÐ¾Ð½Ñ Ð½Ð° базе Android пÑодаÑÑÑÑ Ñ
болÑÑим колиÑеÑÑвом <a href="
+#~ "\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"
+#~ "\"> пÑедÑÑÑановленнÑÑ
неÑвободнÑÑ
пÑиложений, коÑоÑÑе полÑÑаÑÑ Ð´Ð¾ÑÑÑп к "
+#~ "конÑиденÑиалÑнÑм даннÑм без ведома
полÑзоваÑелÑ</a>. ÐÑи ÑкÑÑÑÑе "
+#~ "пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð»Ð¸Ð±Ð¾ оÑÑÑлаÑÑ ÑÑи
даннÑе к Ñебе домой, либо пеÑедаваÑÑ "
+#~ "иÑ
в пÑиложениÑ, ÑÑÑановленнÑе
полÑзоваÑелем, Ñ ÐºÐ¾ÑоÑÑÑ
еÑÑÑ Ð´Ð¾ÑÑÑп к "
+#~ "ÑеÑи, но Ð½ÐµÑ Ð¿ÑÑмого доÑÑÑпа к даннÑм.
ÐÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº маÑÑовой Ñлежке, "
+#~ "над коÑоÑой Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð½ÐµÑ
абÑолÑÑно никакого конÑÑолÑ."
+
+#~ msgid ""
#~ "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
#~ "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
#~ "contacts.html\"> when they go to a junkyard the driver's personal data "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.zh-tw-diff.html 17 Apr 2019 10:00:17 -0000 1.67
+++ proprietary.zh-tw-diff.html 18 Apr 2019 08:00:04 -0000 1.68
@@ -127,9 +127,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -185,6 +185,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
<li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
@@ -233,16 +242,6 @@
The only way it can deserve rational trust is if the software is
free.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
</ul></em></ins></span>
@@ -303,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.zh-tw.po 17 Apr 2019 10:00:17 -0000 1.78
+++ proprietary.zh-tw.po 18 Apr 2019 08:00:04 -0000 1.79
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ebooks “bought” from Microsoft's store check that their DRM is "
"valid by connecting to the store every time their “owner” wants "
"to read them. Microsoft is going to close this store, <a href=\"https://www."
@@ -401,17 +414,6 @@
"the software is free."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- pt-br.po 17 Apr 2019 10:00:17 -0000 1.90
+++ pt-br.po 18 Apr 2019 08:00:04 -0000 1.91
@@ -3242,6 +3242,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- ru.po 17 Apr 2019 14:01:01 -0000 1.153
+++ ru.po 18 Apr 2019 08:00:04 -0000 1.154
@@ -4353,6 +4353,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- zh-tw.po 17 Apr 2019 10:00:17 -0000 1.68
+++ zh-tw.po 18 Apr 2019 08:00:05 -0000 1.69
@@ -3051,6 +3051,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/17
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/18
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/27