[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-microsoft.fr.html malwa...
From: |
GNUN |
Subject: |
www/proprietary malware-microsoft.fr.html malwa... |
Date: |
Mon, 22 Apr 2019 08:00:13 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/04/22 08:00:09
Modified files:
proprietary : malware-microsoft.fr.html
malware-mobiles.fr.html
proprietary-sabotage.fr.html
proprietary/po : de.po es.po fr.po it.po ja.po
malware-microsoft.fr-en.html
malware-mobiles.fr-en.html nl.po pl.po pot
proprietary-sabotage.fr-en.html
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.412&r2=1.413
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.509&r2=1.510
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.75&r2=1.76
Patches:
Index: malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-microsoft.fr.html 21 Apr 2019 08:59:55 -0000 1.80
+++ malware-microsoft.fr.html 22 Apr 2019 12:00:07 -0000 1.81
@@ -302,7 +302,8 @@
pourrait avoir intentionnellement désactivés, et regagner ainsi la totalité
de son pouvoir sur lui. Microsoft a poussé à plusieurs reprises des versions
défectueuses de ce programme sur les machines des utilisateurs, ce qui a
-causé de nombreux problèmes, certains critiques.</p>
+causé de nombreux problèmes, parfois <a
+href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">critiques</a>.</p>
<p>Voilà un exemple de l'attitude arrogante et manipulatrice que les
développeurs de logiciel privateur ont appris à adopter envers les gens
@@ -687,7 +688,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:07 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-mobiles.fr.html 9 Apr 2019 18:00:20 -0000 1.75
+++ malware-mobiles.fr.html 22 Apr 2019 12:00:07 -0000 1.76
@@ -398,6 +398,18 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M201904131">
+ <p>Les données collectées par les applis surveillant le cycle menstruel
et la
+grossesse sont souvent <a
+href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">accessibles
+aux employeurs et aux compagnies d'assurance</a>. Bien que ces données
+soient « anonymisées et agrégées », on peut facilement retrouver quelle
+femme utilise l'appli.</p>
+
+ <p>Ceci a des implications néfastes pour les droits des femmes à la
+non-discrimination dans l'emploi et au libre choix en matière de
maternité.</p>
+ </li>
+
<li id="M201903251">
<p>Un grand nombre de téléphones sous Android sont livrés avec une
quantité
énorme d'<a
@@ -1084,7 +1096,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/22 12:00:07 $
<!-- timestamp end -->
</p>
Index: proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-sabotage.fr.html 21 Apr 2019 08:59:55 -0000 1.78
+++ proprietary-sabotage.fr.html 22 Apr 2019 12:00:07 -0000 1.79
@@ -55,7 +55,8 @@
pourrait avoir intentionnellement désactivés, et regagner ainsi la totalité
de son pouvoir sur lui. Microsoft a poussé à plusieurs reprises des versions
défectueuses de ce programme sur les machines des utilisateurs, ce qui a
-causé de nombreux problèmes, certains critiques.</p>
+causé de nombreux problèmes, parfois <a
+href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">critiques</a>.</p>
<p>Voilà un exemple de l'attitude arrogante et manipulatrice que les
développeurs de logiciel privateur ont appris à adopter envers les gens
@@ -652,7 +653,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:07 $
<!-- timestamp end -->
</p>
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/de.po 22 Apr 2019 11:01:27 -0000 1.75
+++ po/de.po 22 Apr 2019 12:00:07 -0000 1.76
@@ -10775,6 +10775,17 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- po/es.po 22 Apr 2019 11:01:27 -0000 1.100
+++ po/es.po 22 Apr 2019 12:00:07 -0000 1.101
@@ -8660,6 +8660,17 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/fr.po 22 Apr 2019 11:41:32 -0000 1.131
+++ po/fr.po 22 Apr 2019 12:00:07 -0000 1.132
@@ -9011,6 +9011,17 @@
msgid "Latest additions"
msgstr "Ajouts récents"
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/it.po 22 Apr 2019 11:01:27 -0000 1.75
+++ po/it.po 22 Apr 2019 12:00:07 -0000 1.76
@@ -10026,6 +10026,17 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/ja.po 22 Apr 2019 11:01:29 -0000 1.75
+++ po/ja.po 22 Apr 2019 12:00:07 -0000 1.76
@@ -8578,6 +8578,17 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
Index: po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/malware-microsoft.fr-en.html 21 Apr 2019 08:59:55 -0000 1.74
+++ po/malware-microsoft.fr-en.html 22 Apr 2019 12:00:07 -0000 1.75
@@ -291,7 +291,9 @@
“repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
- users' machines, causing numerous problems, some of which critical.</p>
+ users' machines, causing numerous problems, some of which <a
+
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
+ critical</a>.</p>
<p>This exemplifies the arrogant and manipulative attitude
that proprietary software developers have learned to adopt
@@ -655,7 +657,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/malware-mobiles.fr-en.html 9 Apr 2019 18:00:20 -0000 1.65
+++ po/malware-mobiles.fr-en.html 22 Apr 2019 12:00:07 -0000 1.66
@@ -379,6 +379,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's rights to equal employment
+ and control over their own body. Don't use these apps, even if someone
+ offers you a reward to do so.</p>
+ </li>
+
<li id="M201903251">
<p>Many Android phones come with a huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
@@ -1020,7 +1032,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/22 12:00:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/nl.po 22 Apr 2019 11:01:29 -0000 1.75
+++ po/nl.po 22 Apr 2019 12:00:07 -0000 1.76
@@ -7036,6 +7036,17 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/pl.po 22 Apr 2019 11:01:29 -0000 1.75
+++ po/pl.po 22 Apr 2019 12:00:08 -0000 1.76
@@ -6546,6 +6546,17 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/pot 22 Apr 2019 11:01:29 -0000 1.75
+++ po/pot 22 Apr 2019 12:00:08 -0000 1.76
@@ -6043,6 +6043,17 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- po/proprietary-sabotage.fr-en.html 21 Apr 2019 08:59:55 -0000 1.68
+++ po/proprietary-sabotage.fr-en.html 22 Apr 2019 12:00:08 -0000 1.69
@@ -47,7 +47,9 @@
“repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
- users' machines, causing numerous problems, some of which critical.</p>
+ users' machines, causing numerous problems, some of which <a
+
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
+ critical</a>.</p>
<p>This exemplifies the arrogant and manipulative attitude
that proprietary software developers have learned to adopt
@@ -611,7 +613,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-surveillance.de-diff.html 22 Apr 2019 11:01:29 -0000
1.64
+++ po/proprietary-surveillance.de-diff.html 22 Apr 2019 12:00:08 -0000
1.65
@@ -1121,17 +1121,15 @@
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to
snoop</em></ins></span>
- and <span class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>read logs
- for</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch on its users. Furthermore, they could
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
- in</em></ins></span> other <span class="inserted"><ins><em>ways.</p>
+ in other ways.</p>
- <p>This is evidence that proprietary</em></ins></span> apps <span
class="inserted"><ins><em>generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN
developers</strong></del></span> <span class="inserted"><ins><em>freedom,
Android users
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
Android by <a href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
@@ -1146,11 +1144,8 @@
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not</em></ins></span> have <span
class="removed"><del><strong>confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
- It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>LinkedIn. Also, it stores detailed
logs</strong></del></span> <span class="inserted"><ins><em>each
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to each
other but not to the server's database.</p>
</li>
@@ -1158,14 +1153,20 @@
<p>The moviepass app and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>after
going</em></ins></span> to <span class="removed"><del><strong>read logs
+ for other</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android</em></ins></span> apps
+ <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1175,7 +1176,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book</em></ins></span> to <span class="removed"><del><strong>LinkedIn.
Also, it stores detailed logs</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1202,14 +1203,14 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>non-premium version</strong></del></span>
<span class="inserted"><ins><em>responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google</em></ins></span> have
- <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+ <p>Could Google have done a better job</em></ins></span> of <span
class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
@@ -1247,17 +1248,18 @@
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
- </li>
+ <p>With proprietary apps, one can only hope that <span
class="removed"><del><strong>they don't.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li>
+ <p>A study found 234 Android apps</strong></del></span> <span
class="inserted"><ins><em>they don't.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
+ <li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
- </p></strong></del></span>
- <span class="inserted"><ins><em>programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
<li id="M201704260">
@@ -1274,179 +1276,140 @@
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ If the fine print of the app said</em></ins></span> that <span
class="removed"><del><strong>track</strong></del></span> users <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>gave consent for this,
+ would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from
beacons placed in stores or played by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>design
the app to snoop at all</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
- <p>Pairs of <span class="removed"><del><strong>Android apps can
collude to transmit users' personal</strong></del></span> <span
class="inserted"><ins><em>Android apps can collude
+ <p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
- <li id="M201703300">
- <p>Verizon <a
-
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
- its search engine.</p>
-
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
- still spyware.</p>
- </li>
-
- <li id="M201701210">
- <p>The Meitu photo-editing app <a
-
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</em></ins></span> data to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese
company</a>.</p></em></ins></span>
- </li>
-
<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
+<p>Google Play intentionally sends app developers</strong></del></span>
- <span class="inserted"><ins><em><li id="M201611280">
- <p>The Uber</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>tracks</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201703300">
+ <p>Verizon</em></ins></span> <a
<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
- <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>user's
- consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>not enough
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>it will</a> pre-install
+ on some</em></ins></span> of <span class="removed"><del><strong>users is
not enough
to legitimize actions like this. At this point, most users have
-stopped reading</strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
- massive surveillance.</p>
- </li>
+stopped reading</strong></del></span> <span class="inserted"><ins><em>its
phones. The app will give Verizon</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>same
information
+ about the users' searches</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to.</strong></del></span> Google <span
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
+ its search engine.</p>
- <li id="M201611160">
- <p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>privacy</em></ins></span> and <span
class="removed"><del><strong>Conditions”</strong></del></span> <span
class="inserted"><ins><em>security of
- 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>“in
spite</em></ins></span> of <span class="removed"><del><strong>hiding it in an
obscurely worded EULA.</p>
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on <span
class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.</p>
-<p>However, to truly protect people's</strong></del></span> <span
class="inserted"><ins><em>the promises
- for</em></ins></span> privacy, <span class="removed"><del><strong>we must
prevent Google</strong></del></span> <span
class="inserted"><ins><em>security,</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>anonymity
given by</em></ins></span> the <span class="removed"><del><strong>first
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>only one
phone</a>,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in</strong></del></span> the
<span class="removed"><del><strong>first
place!</p>
</li>
<li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>majority</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>user must
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>spyware is
+ still spyware.</p>
+ </li>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example</strong></del></span> <span
class="inserted"><ins><em>VPN
- apps—millions</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>users may be unawarely
subject</em></ins></span> to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
+ <li id="M201701210">
+ <p>The Meitu photo-editing app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p>
+ </li>
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
- unthinkable with free software.</p>
+ <li id="M201611280">
+ <p>The Uber app</em></ins></span> tracks <span
class="removed"><del><strong>the users' movements without their
permission</a>.</p>
- </li>
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
+ yet another</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
- <li><p>More than 73% of</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the
<span class="removed"><del><strong>most popular Android</strong></del></span>
<span class="inserted"><ins><em>research paper,
- of some proprietary VPN</em></ins></span> apps
- <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>that track
users</em></ins></span> and <span class="removed"><del><strong>location
information</a> of</strong></del></span> <span
class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>users with third parties.</p>
+ <p>This</em></ins></span> example <span
class="removed"><del><strong>of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how
“getting</em></ins></span> the <span class="removed"><del><strong>user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>user's
+ consent” for surveillance is inadequate as</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>protection against
+ massive surveillance.</p></em></ins></span>
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span>
- <span class="inserted"><ins><em>privacy:</p>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
- <dl class="compact">
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</em></ins></span> to <span class="inserted"><ins><em>track users
and show them targeted ads.</dd>
+ <span class="inserted"><ins><em><li id="M201611160">
+ <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy</em></ins></span>
and <span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ </li>
- <dt>sFly Network Booster</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ <li><p>“Cryptic communication,” unrelated to the
app's functionality,
was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
- text messages.</dd>
+ found in the 500 most popular gratis</strong></del></span>
+ <span class="inserted"><ins><em>283</em></ins></span> Android <span
class="removed"><del><strong>apps</a>.</p>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>say
+ <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="removed"><del><strong>as
+ “free”—they are not free software. The clear way to say
“zero price” is “gratis.”</p>
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>read logs</em></ins></span>
- for <span class="removed"><del><strong>granted that the usual analytics
tools are
- legitimate, but is that valid? Software</strong></del></span> <span
class="inserted"><ins><em>other apps and also core system logs.
TigerVPN</em></ins></span> developers have <span
class="removed"><del><strong>no right</strong></del></span>
- <span class="inserted"><ins><em>confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>concluded</em></ins></span> that <span
class="inserted"><ins><em>“in spite of</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what</strong></del></span> <span class="inserted"><ins><em>promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of</em></ins></span> users <span
class="removed"><del><strong>are doing or how. “Analytics” tools
that snoop are
just as wrong as any other snooping.</p>
</li>
<li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span class="inserted"><ins><em>LinkedIn.
Also, it stores detailed logs and
- may turn them over</em></ins></span> to <span
class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the UK government if requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
- roughly five tracking libraries. Also, it redirects the user's
- traffic through valueclick.com (an advertising website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>also uses
roughly
- five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
- the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection for
- tracking the user and displaying ads.</dd>
- </dl></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609210">
- <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ connect</strong></del></span> <span class="inserted"><ins><em>may be
unawarely subject</em></ins></span> to <span class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>poor security
+ guarantees</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p>
+ </li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>abusive practices inflicted by VPN
apps.”</p>
+
+ <p>Following</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add</strong></del></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
+ privacy:</p>
- <span class="inserted"><ins><em><li id="M201606050">
- <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ <dl class="compact">
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries</em></ins></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections for known faces</a>,
- and suggests you</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>system.</p>
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>picture you take according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
@@ -1456,143 +1419,222 @@
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>who is</em></ins></span>
- in <span class="removed"><del><strong>iThings</h4>
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="inserted"><ins><em>show them targeted ads.</dd>
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
- would</strong></del></span> require <span
class="removed"><del><strong>circumventing the iOS DRM.</p>
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong><a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span class="inserted"><ins><em>has full
access</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
</li>
- <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth</strong></del></span> <span class="inserted"><ins><em>online
access to some
- known-faces database, which means</em></ins></span> the
+ <li><p>In the latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>users'
+ text messages.</dd>
+
+ <dt>DroidVPN</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>TigerVPN</dt>
+ <dd>Requests</em></ins></span> the
<span class="removed"><del><strong>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>pictures are likely</em></ins></span> to be
<span class="removed"><del><strong>spied on”.</p>
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em><code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p>
</li>
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span>
- <span class="inserted"><ins><em>sent across the wire</em></ins></span> to
<span class="removed"><del><strong>use it without having your fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>Facebook's servers and face-recognition
+ — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>read logs
+ for other apps and also core system logs. TigerVPN developers have
+ confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>stores detailed logs and
+ may turn them over</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>UK government if requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection</em></ins></span> is <span
class="removed"><del><strong>snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> <span class="inserted"><ins><em>to display
ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> app <span
class="removed"><del><strong>on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span> <span
class="inserted"><ins><em>have confirmed</em></ins></span> that
+ the <span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>non-premium
version of</em></ins></span> the <span class="removed"><del><strong>server
records these numbers</strong></del></span> <span class="inserted"><ins><em>app
does JavaScript injection</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving the code Apple
+ sends to it.</p>
+ </li>
+
+ <li><p>Around 47% of</strong></del></span>
+ <span class="inserted"><ins><em>tracking</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p></strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
+ </dl></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</em></ins></span>
+ all <span class="removed"><del><strong>the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud</strong></del></span> <span
class="inserted"><ins><em>conversations</a>.</p>
+ </li>
+
+ <li id="M201606050">
+ <p>Facebook's new Magic</em></ins></span> Photo <span
class="removed"><del><strong>Library stores every</strong></del></span> <span
class="inserted"><ins><em>app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's</em></ins></span> photo <span
class="inserted"><ins><em>collections for known
faces</a>,</em></ins></span>
+ and <span class="removed"><del><strong>video</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>take,
+ and keeps them up</strong></del></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits</strong></del></span> <span class="inserted"><ins><em>share
the picture</em></ins></span> you <span class="removed"><del><strong>make are
automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>take according to
who</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
+ <span class="inserted"><ins><em>in</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud”</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which</em></ins></span> means
+ <span class="removed"><del><strong>“please don't ask
where.”</p>
+
+ <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>the pictures are likely</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them</em></ins></span> to
<span class="removed"><del><strong>tell whether</strong></del></span> the <span
class="removed"><del><strong>phone is snooping</strong></del></span> <span
class="inserted"><ins><em>service.</p>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them</em></ins></span> to
<span class="inserted"><ins><em>the service.</p>
</li>
<li id="M201605310">
- <p>Facebook's app listens all the time, <a
-
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>what people are listening to or watching</a>.
In addition,
- it may be analyzing people's conversations to serve them with targeted
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>or
watching</a>. In addition,
+ it may be analyzing people's conversations</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any
of</strong></del></span> <span
class="inserted"><ins><em>serve</em></ins></span> them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>with targeted
advertisements.</p>
</li>
<li id="M201604250">
- <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span>
+ <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> data <span
class="removed"><del><strong>to Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and
in server accounts,
- it</em></ins></span> can
- <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>alter</em></ins></span> them <span
class="removed"><del><strong>from there.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ spy on many sorts of data</em></ins></span> in <span
class="removed"><del><strong>iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span
class="inserted"><ins><em>phone,</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>in server
accounts,
+ it can alter them too</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web</strong></del></span>
<span class="inserted"><ins><em><li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="inserted"><ins><em>include <a
+ <p>Apps that include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ are playing nearby</a>. Also on what users post on
various</em></ins></span> sites
+ <span class="inserted"><ins><em>such as Facebook, Google+ and
Twitter.</p>
</li>
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>server
records</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
+ unrelated</em></ins></span> to <span class="removed"><del><strong>track
users, which is</strong></del></span> <span class="inserted"><ins><em>the app's
functionality, was</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
- <p>The article should not have described</em></ins></span> these
<span class="removed"><del><strong>numbers for at least 30
- days.</p>
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span
class="inserted"><ins><em>should not have described these apps as
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate,</em></ins></span> but <span
class="removed"><del><strong>it</strong></del></span> is <span
class="removed"><del><strong>still true in iOS 7.)</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>apps as
- “free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
-
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
- legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
- <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> that <span class="removed"><del><strong>can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Around</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and</em></ins></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, from Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
- personal, behavioral and <span class="removed"><del><strong>location
information</a> of their</strong></del></span> <span
class="inserted"><ins><em>location information</a> of their users with
- third parties.</p>
+ <p>More than 73% and 47% of mobile applications, from
Android</em></ins></span> and <span class="removed"><del><strong>regularly
does,</strong></del></span> <span class="inserted"><ins><em>iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
+ third parties.</p></em></ins></span>
</li>
- <li id="M201508210">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</em></ins></span> users <span class="removed"><del><strong>with
third parties.</p>
+ based</em></ins></span> on <span class="removed"><del><strong>all the data
in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>proprietary
malware (DRM and snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
</li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>submit</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all the photos and
- videos they make.</p>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>, and some are starting
+ to realize that it</em></ins></span> is <span
class="inserted"><ins><em>nasty.</p>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>keeps them up to date on all your devices.
- Any edits you make</strong></del></span> <span
class="inserted"><ins><em>some</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
- </p></blockquote>
+ <p>This article shows</em></ins></span> the <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>starting
- to realize that it</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>nasty.</p>
-
- <p>This article shows</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
- <p>There is a way to</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</em></ins></span> as a
- <span class="removed"><del><strong>surveillance functionality.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span> <span
class="inserted"><ins><em>“serve”
+<ul>
+ <li><p>Tracking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They needed to break
Apple's
- security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>the attitude</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the proprietary software industry
+ typical example of the attitude of the proprietary</em></ins></span>
software <span class="inserted"><ins><em>industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1601,145 +1643,147 @@
<li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>2015</a> found that 90% of</em></ins></span>
the <span class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>top-ranked gratis
proprietary
- Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>iThing is,
- and get other info too.</p>
- </li>
+ study</em></ins></span> in <span
class="removed"><del><strong>popular</strong></del></span> <span
class="inserted"><ins><em>2015</a> found that 90% of the top-ranked
gratis proprietary</em></ins></span>
+ Android apps <span class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
- <li><p>There is also a feature for web sites to track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</strong></del></span> <span
class="inserted"><ins><em>paid
+ <li><p>Android tracks location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services”</strong></del></span> <span
class="inserted"><ins><em>contained recognizable tracking libraries. For the
paid
proprietary apps, it was only 60%.</p>
- <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span
class="inserted"><ins><em>confusingly describes gratis apps as
- “free”,</em></ins></span> but <span
class="removed"><del><strong>it
- is still true</strong></del></span> <span class="inserted"><ins><em>most
of them are not</em></ins></span> in <span class="removed"><del><strong>iOS
7.)</p>
- </li>
-
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>fact</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>. It also uses the
- ugly word “monetize”. A good replacement for</em></ins></span>
that <span class="removed"><del><strong>can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis Android apps (but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>average.</p></em></ins></span>
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>turned off, even
+ when</strong></del></span> <span class="inserted"><ins><em>not in fact
<a
+ href="/philosophy/free-sw.html">free software</a>. It also
uses</em></ins></span> the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span>
+ <span class="inserted"><ins><em>ugly word “monetize”. A good
replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
+ </li>
+
+ <li id="M201505060">
+ <p>Gratis Android apps (but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+ <li><p>According</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>off, listen to the microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>average.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504060">
+ <li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</em></ins></span> snoop on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data in an iThing,
- or it</strong></del></span> <span
class="inserted"><ins><em>user</a>. This</em></ins></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
+ QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user</a>.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>in addition</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data that their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done</em></ins></span> by the
<span class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>whether the app developers
- get users</em></ins></span> to <span class="removed"><del><strong>exist
for</strong></del></span> <span class="inserted"><ins><em>say “I
agree”. That is</em></ins></span> no
- <span class="removed"><del><strong>possible
purpose</strong></del></span> <span class="inserted"><ins><em>excuse for
- malware.</p>
+ <li><p>A Motorola</strong></del></span> phone
+ <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <li id="M201411260">
- <p>Many proprietary apps for mobile devices
- report which</em></ins></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>apps</em></ins></span>
the <span class="inserted"><ins><em>user has installed.</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>OS</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us</strong></del></span>
+ <span class="inserted"><ins><em>the phone.</p>
+
+ <p>Don't be distracted</em></ins></span> by <span
class="removed"><del><strong>a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>question of
whether</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>app developers
+ get users to say “I agree”. That</em></ins></span> is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>no excuse for
+ malware.</p></em></ins></span>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command</strong></del></span>
-<ul>
- <li><p>Tracking software</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</em></ins></span> in <span
class="removed"><del><strong>popular Android apps</strong></del></span> <span
class="inserted"><ins><em>a way that at least</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>visible</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
- as bad as what the others do.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201411260">
+ <p>Many proprietary apps for mobile devices
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</em></ins></span> and
<span class="removed"><del><strong>users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>optional</a>.
Not
+ as bad as what the others do.</p>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span>
+ <li id="M201401150.1">
+ <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method Editor">IME</abbr></a>.</p>
+ title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
</li>
- <li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is to
restrict</em></ins></span> the <span class="removed"><del><strong>phone has no
SIM card</a>.</p></li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
- <span class="inserted"><ins><em>use</em></ins></span> of data <span
class="inserted"><ins><em>on the user's computer, but it does surveillance too:
<a
+ <span class="inserted"><ins><em><li id="M201312270">
+ <p>The</em></ins></span> nonfree Snapchat app's principal purpose is
to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>get the user's list of other people's phone
- numbers</a>.</p>
+ it tries to get the user's list of other people's phone
+ <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>numbers</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
- <li id="M201312060">
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a></strong></del></span>
+ <span class="inserted"><ins><em><li id="M201312060"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Brightest Flashlight</em></ins></span> app <span
class="removed"><del><strong>and dis-service spy on users even more than users
+ expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</em></ins></span> by <span
class="inserted"><ins><em>companies</a>.</p>
+ sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
- approve</em></ins></span> sending <span
class="removed"><del><strong>hidden text messages which enable
them</strong></del></span> <span class="inserted"><ins><em>personal
data</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> the <span
class="removed"><del><strong>phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>app developer but did not ask
- about sending it</em></ins></span> to <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>microphone, retrieve geo-location data from
the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>weakness of</em></ins></span>
- the <span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
+ <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a <span class="removed"><del><strong>movie</a>.
+ </p>
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission
is</strong></del></span>
- <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>flashlight app
send any information to
- anyone? A free software flashlight app would not.</p>
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span
class="inserted"><ins><em>flashlight app send any information to
+ anyone? A free software flashlight app would
not.</p></em></ins></span>
</li>
- <li id="M201212100">
- <p>FTC says most mobile apps</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
+ <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>children don't respect privacy:</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201212100">
+ <p>FTC says most mobile</em></ins></span> apps <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1749,15 +1793,26 @@
<ul class="blurbs">
<li id="M201307110">
- <p>Skype contains <a
-
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype <a
-
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</em></ins></span> for <span
class="removed"><del><strong>voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p></em></ins></span>
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by</strong></del></span>
+ <li>
+ <p>Facebook's app listens all the time,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening to or watching</a>. In addition, it may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1768,139 +1823,80 @@
<ul class="blurbs">
<li id="M201806240">
- <p>Red Shell is</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here</strong></del></span>
- is <span class="inserted"><ins><em>found in many proprietary games.
It</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <p>Red Shell is a spyware that
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</strong></del></span>
<span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data</em></ins></span> on
- <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>users' computers</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> to <span class="removed"><del><strong>have
GPS.)</p></strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p></em></ins></span>
+ tracks data on users' computers and sends</em></ins></span> it <span
class="removed"><del><strong>demands</strong></del></span> to <span
class="removed"><del><strong>personal data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced</strong></del></span>
<span class="inserted"><ins><em><li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>restrict
- the use of data on</strong></del></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>massive
- multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>get the</strong></del></span> <span
class="inserted"><ins><em>snoop on all open processes running on
its</em></ins></span> user's <span class="removed"><del><strong>list of other
people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>computer</a>.</p></em></ins></span>
+ program along with</em></ins></span> an <span
class="removed"><del><strong>opt-in proprietary search app that it
will</a>
+ pre-install</strong></del></span> <span
class="inserted"><ins><em>update to the massive
+ multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running</em></ins></span> on <span
class="removed"><del><strong>some of</strong></del></span> its <span
class="removed"><del><strong>phones. The app will give Verizon the
same</strong></del></span> <span class="inserted"><ins><em>user's
computer</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-<ul>
- <li></strong></del></span>
+ <li id="M201711070">
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
+ information <span class="removed"><del><strong>about the users' searches
that Google normally gets when
+ they use its search engine.</p>
- <span class="inserted"><ins><em><li id="M201711070"></em></ins></span>
- <p>The <span class="removed"><del><strong>moviepass app and
dis-service spy</strong></del></span> <span class="inserted"><ins><em>driver
for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ <p>Currently, the app is</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201512290">
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</em></ins></span> on <span
class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>even more than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</strong></del></span> and <span
class="removed"><del><strong>after going</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to <span
class="inserted"><ins><em>the
- internet</a>—even what their users weigh.</p>
-
- <p>A game console is</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
- </p>
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>their users</em></ins></span> and <span
class="inserted"><ins><em>report to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of
spyware</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>Don't be tracked — pay cash!</p>
- </li>
-
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span> <span
class="inserted"><ins><em>computer, and you can't trust a computer with
+ <p>A game console</em></ins></span> is
+ <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>a
computer, and you can't trust a computer with
a nonfree operating system.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
<span class="inserted"><ins><em><li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
- book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>their users'
+ collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="inserted"><ins><em>merge the data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
- </li>
-
- <li>
- <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what</strong></del></span> <span
class="inserted"><ins><em>manipulate</em></ins></span> people <span
class="removed"><del><strong>are listening</strong></del></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it
may</strong></del></span> <span class="inserted"><ins><em>buy things, and hunt
for
- “whales” who can</em></ins></span> be <span
class="removed"><del><strong>analyzing people's conversations to serve them
with targeted
- advertisements.</p>
- </li>
-
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>led</em></ins></span> to <span
class="removed"><del><strong>do lots</strong></del></span> <span
class="inserted"><ins><em>spend a lot</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>money. They also
- use a back door</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p>
- </li>
+ <p>They use this</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give
Verizon</strong></del></span> <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games,
games</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
- they</strong></del></span> <span class="inserted"><ins><em>cost money
- can</em></ins></span> use <span class="removed"><del><strong>its search
engine.</p>
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>manipulate people to
buy things, and hunt for
+ “whales” who</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>be led
to spend a lot</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <p>Currently,</strong></del></span> the <span
class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>same tactics.</p>
+ <p>While the article describes gratis games, games that cost money
+ can use</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>same tactics.</p>
</li>
<li id="M201401280">
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span>
takes <span class="removed"><del><strong>effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span> <span
class="inserted"><ins><em>advantage</em></ins></span>
- to <span class="removed"><del><strong>a Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>spy
through</em></ins></span> it <span class="removed"><del><strong>can
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>in server accounts,</strong></del></span> <span
class="inserted"><ins><em>the NSA takes advantage
+ to spy through</em></ins></span> it <span class="removed"><del><strong>can
alter them</strong></del></span> too</a>.
<span class="removed"><del><strong></p></li>
@@ -1931,52 +1927,37 @@
are playing nearby</a>. Also</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies</em></ins></span> on <span class="removed"><del><strong>what users
post</strong></del></span> <span class="inserted"><ins><em>every process
running</em></ins></span> on <span class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p>
- </li>
-
- <li><p>Facebook's new Magic Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>a
gamer's computer</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the picture you take
according</strong></del></span> <span class="inserted"><ins><em>sniffs a
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>do with
cheating.</p>
+ have nothing to do with cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>the frame.</p>
-
- <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>Connected
Equipment</h3>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to</strong></del></span> <span
class="inserted"><ins><em>people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>picture you take according to
who</strong></del></span> <span class="inserted"><ins><em>people that use
them</a>.</p>
- <p>Don't</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>a sucker—reject all</em></ins></span> the
<span class="removed"><del><strong>wire to Facebook's servers and
face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>service.</p>
- </li>
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>article uses the
term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -1986,84 +1967,105 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>some
- are starting to realize</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out the other way.”
Evidently</em></ins></span> that <span class="removed"><del><strong>it is
nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>was
+<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in</em></ins></span>
the <span class="removed"><del><strong><a
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>own words</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>company's
+ CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>the service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>third parties.
This</em></ins></span> is <span class="removed"><del><strong>based on
proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>snooping). In
August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>slightly
+ lower retail prices.</p>
+
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting</strong></del></span> <span class="inserted"><ins><em>make
this spying acceptable, according</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>him,
+ is</em></ins></span> that it is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong><a
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</strong></del></span>
<span class="inserted"><ins><em>own words of the company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that.</strong></del></span> <span
class="inserted"><ins><em>third parties.</em></ins></span> This is <span
class="removed"><del><strong>a typical example of
- the attitude of the proprietary software industry towards
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span>
+ <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the <span
class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>scenes,
+ and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
</li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>in return</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
- lower retail prices.</p>
+ <li><p>Many proprietary apps</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
- <p>What</em></ins></span> is <span
class="removed"><del><strong>doing</strong></del></span> <span
class="inserted"><ins><em>supposed to make</em></ins></span> this <span
class="removed"><del><strong>in a way</strong></del></span> <span
class="inserted"><ins><em>spying acceptable, according to him,
- is</em></ins></span> that <span class="removed"><del><strong>at
least</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> is <span
class="removed"><del><strong>visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong>others do.</p>
+ <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>mobile devices
report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>that
+ matter),</em></ins></span> the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on
you</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
+ <span class="inserted"><ins><em>to disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>terrestrial antenna
+ instead. Unfortunately, this</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>not always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software),</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>set up a
+ firewall to block connections to Vizio's servers. Or,</em></ins></span> as
<span class="removed"><del><strong>what the others do.</p>
</li>
- <li><p>FTC says most mobile apps for
children</strong></del></span> <span class="inserted"><ins><em>Vizio software is
- nonfree, we</em></ins></span> don't <span
class="removed"><del><strong>respect privacy:
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>.
This</strong></del></span> <span class="inserted"><ins><em>know
what</em></ins></span> is <span class="removed"><del><strong>in addition to
- the snooping done by</strong></del></span> <span
class="inserted"><ins><em>actually happening behind</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
- and <span class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>question of
whether</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>article
for</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>facts it presents. It
+ is too bad that</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter),</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users</strong></del></span> <span class="inserted"><ins><em>easiest
way</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span class="inserted"><ins><em>make
sure it isn't spying on you</em></ins></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
+ <p>Don't be distracted</strong></del></span> <span
class="inserted"><ins><em>article finishes</em></ins></span> by <span
class="inserted"><ins><em>advocating</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
+ users</strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
</li>
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <li><p>The Brightest Flashlight</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix</em></ins></span> app <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies.</a></p>
- <p>The FTC criticized this app because</strong></del></span>
- <span class="inserted"><ins><em>to disconnect</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>get your own router
(which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
- <li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link</em></ins></span> to the <span
class="removed"><del><strong>app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>article for the facts</em></ins></span> it <span
class="removed"><del><strong>to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>presents. It
- is too bad that the article finishes by advocating</em></ins></span> the
- <span class="inserted"><ins><em>moral</em></ins></span> weakness of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send any information to anyone? A free software
flashlight</strong></del></span> <span class="inserted"><ins><em>Netflix. The
Netflix</em></ins></span> app <span class="removed"><del><strong>would
not.</p>
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>image is coming from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending it to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
+ the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p>
</li>
</ul>
@@ -2075,121 +2077,110 @@
<ul>
<li>
- <p>A remote-control sex toy was found to make</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two
users</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>disable the
+ surveillance, even if it were not hidden as it</em></ins></span> was <span
class="removed"><del><strong>found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span> <span class="inserted"><ins><em>in these TVs,
+ does not legitimize</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>The</strong></del></span>
+ <p>The “smart” toys My Friend Cayla</strong></del></span>
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>toys My Friend Cayla and i-Que
transmit</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>a child's speech,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>even speak
- into</strong></del></span> <span class="inserted"><ins><em>not just
broadcasts and
- cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through</strong></del></span> <span
class="inserted"><ins><em>image is coming from</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
-
- <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>user's own computer,</em></ins></span>
- the <span class="removed"><del><strong>temperature</strong></del></span>
<span class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="inserted"><ins><em>a way to
disable</em></ins></span> the <span class="removed"><del><strong>vibrator
minute by
- minute (thus, indirectly, whether</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as</em></ins></span> it was <span
class="removed"><del><strong>surrounded</strong></del></span> <span
class="inserted"><ins><em>in these TVs,
- does not legitimize the surveillance.</p>
- </li>
-
- <li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds to be picked up</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well</strong></del></span> <span
class="inserted"><ins><em>proprietary malware running
- on other devices in range so</em></ins></span> as <span
class="removed"><del><strong>the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard</strong></del></span> <span class="inserted"><ins><em>to
determine that they
- are nearby. Once your Internet devices are paired</em></ins></span> with
<span class="removed"><del><strong>which</strong></del></span>
- <span class="inserted"><ins><em>your TV, advertisers can correlate ads
with Web activity, and other <a
+ <span class="inserted"><ins><em><li id="M201511130">
+ <p>Some web</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>TV
advertisements play inaudible
+ sounds</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
+ a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware running
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to
determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys</strong></del></span>
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="inserted"><ins><em>Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
<li id="M201511060">
- <p>Vizio goes a step further than other TV</em></ins></span>
- manufacturers <span class="removed"><del><strong>would make statements
about</strong></del></span> <span class="inserted"><ins><em>in spying on their
users:</em></ins></span> their <span class="removed"><del><strong>products,
rather than free software which users could have
- checked and changed.</p>
+ <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
+ manufacturers</em></ins></span> in <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
- <p>The company that made the vibrator</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
+ <li>
+ <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>their users: their</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
- <p>The company's statement</strong></del></span>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the data may be
- true,</strong></del></span> <span class="inserted"><ins><em>advertisers
can track you
+ link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off,</em></ins></span> but <span
class="inserted"><ins><em>having</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If it had sold the data to a
- data broker, the data broker would have been able</strong></del></span>
<span class="inserted"><ins><em>enabled by default
+ <p>It is possible to turn this off, but having</em></ins></span> it
<span class="removed"><del><strong>was surrounded</strong></del></span> <span
class="inserted"><ins><em>enabled</em></ins></span> by <span
class="removed"><del><strong>a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>figure out
- who</strong></del></span> the <span class="removed"><del><strong>user
was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>600 millions social media
profiles</em></ins></span> the company <span class="removed"><del><strong>has
been ordered</strong></del></span>
- <span class="inserted"><ins><em>already monitors. Tivo customers are
unaware they're
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard</strong></del></span> <span class="inserted"><ins><em>company
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
+ information</em></ins></span> with <span
class="removed"><del><strong>which manufacturers would make statements about
+ their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>online social media participation, Tivo can now
<a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>new combined surveillance by default.</p>
+ correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
+ users <span class="removed"><del><strong>could have
+ checked</strong></del></span> <span class="inserted"><ins><em>to new
combined surveillance by default.</p>
</li>
<li id="M201507240">
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>total of C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
- </li>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>changed.</p>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+ <p>The company that made the vibrator</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about
how</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what</em></ins></span> people <span class="removed"><del><strong>used
it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data
to</strong></del></span> <span class="inserted"><ins><em>are
watching</a>, even if it isn't</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able to figure out
+ who the user was.</p>
+
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they
wanted</em></ins></span> to <span class="removed"><del><strong>the
- manufacturer</a>. Guess what?</strong></del></span>
+ snoops on what programs people watch, and even what they
wanted</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span>
<span class="inserted"><ins><em>record</a>.</p>
</li>
<li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade”</em></ins></span> to
<span class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>make
its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used</em></ins></span> a <span class="removed"><del><strong>total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>firmware
“upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make</em></ins></span> its <span
class="removed"><del><strong>customers.</p></strong></del></span> <span
class="inserted"><ins><em>TVs snoop on what
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
- <li id="M201502090">
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090">
+ <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
Nuance can save it</em></ins></span> and <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>US or some
other government.</p>
@@ -2232,25 +2223,28 @@
<p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
<span class="inserted"><ins><em><li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in
China</a>.</p></strong></del></span>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ on their users</a>.</p>
- <p>The <span class="removed"><del><strong>article says this is a
back door,</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014,</em></ins></span> but <span class="inserted"><ins><em>we don't expect
this has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
+ <p>This shows</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
+ <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a
- <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>back door, but</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
+
+ <p>Proper laws would say</em></ins></span> that <span
class="removed"><del><strong>could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -2260,10 +2254,7 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>tracking, the TV will not
- work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report what the
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>report what the
user watches—no exceptions!</p>
</li>
@@ -2281,17 +2272,13 @@
no effect</a>. (The fact</em></ins></span> that the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>means nothing; the server could save that data
anyway.)</p>
-
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2305,10 +2292,10 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>means nothing;</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
@@ -2323,10 +2310,13 @@
</div>
<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+ <li><p>Spyware in Skype:</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>had installed a patch to stop this, but any
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
+
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
@@ -2408,155 +2398,231 @@
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511250"></em></ins></span>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ <p>The Nest Cam “smart” camera is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means the manufacturer is using it
to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain JavaScript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report</strong></del></span> <span class="inserted"><ins><em><a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,</em></ins></span>
+ even <span class="removed"><del><strong>which page</strong></del></span>
<span class="inserted"><ins><em>when</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain JavaScript code,
- and</strong></del></span>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this</strong></del></span>
+<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
+ <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the</em></ins></span> code <span
class="removed"><del><strong>snoops on
readers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>could surely convert it
- into one.</p></em></ins></span>
- </li>
+ listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
+ settings</a>.</p>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only</strong></del></span>
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
+ into one.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201711100">
+ <li id="M201711100">
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the
- <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>users could have checked
+ products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
and changed.</p>
- <p>The company that</em></ins></span> made <span
class="removed"><del><strong>“Digital
Editions,”</strong></del></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</strong></del></span>
+ <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting</em></ins></span> lots of <span
class="inserted"><ins><em>personal information about how people
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the</em></ins></span>
data to <span class="removed"><del><strong>Adobe</a>. Adobe's
“excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>a data
- broker, the data broker would have been able</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ true, but it doesn't really matter. If</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>had sold the data</em></ins></span> to <span
class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
</li>
-</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>figure out who the
- user was.</p>
+ <li><p>Tesla cars allow</strong></del></span> the <span
class="removed"><del><strong>company to extract data remotely and
+ determine</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data
+ and hand it over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company</em></ins></span> has <span class="inserted"><ins><em>been
ordered to pay</em></ins></span> a <span class="removed"><del><strong>built-in
cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access</strong></del></span> <span class="inserted"><ins><em>total of
C$4m</a> to</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
- settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span class="inserted"><ins><em>customers.</p>
- </li>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
- </li>
+<ul>
+ <li><p>Lots of</strong></del></span>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
- company <span class="removed"><del><strong>to track</strong></del></span>
<span class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>products are
+ designed</strong></del></span> <span class="inserted"><ins><em>toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span
class="removed"><del><strong>everyone</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>listen in on a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+
+ <p>Today's technological practice does not include any way of
+ making</strong></del></span> <span class="inserted"><ins><em>toys
with</em></ins></span> a <span class="removed"><del><strong>device that can
obey your voice commands without
+ potentially spying</strong></del></span> <span
class="inserted"><ins><em>mobile phone. This would enable
+ crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>you. Even if it is air-gapped, it could be
+ saving up records about you for later examination.</p>
+ </li>
+
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
- <p>The case of toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence of a way to
+ disable the surveillance, even if it were not hidden as it was in
+ these TVs, does not legitimize the surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>this article,</strong></del></span> <span
class="inserted"><ins><em>many cases <a
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
@@ -2571,127 +2637,93 @@
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
- paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
+ paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+ <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
+ specific cases, it spies</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
+ restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ across devices.</p>
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="removed"><del><strong>doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
-
- <p>These crackers are probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break the security of an Amazon device,
+ and <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
+ turn <span class="removed"><del><strong>this off, but
having</strong></del></span> it <span class="removed"><del><strong>enabled by
default
+ is an injustice already.</p>
</li>
- <li id="M201804140">
- <p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Lots</strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over the Internet</a>.</p>
- </li>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>into a
listening device</a> for them.</p>
- <li id="M201706204">
- <p>Lots</em></ins></span> of “smart” products are
designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>do this, or
cease</em></ins></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>sell the
product</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>that country,
+ do you think Amazon would have the moral fiber</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
+ Internet devices</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>probably
hackers too, but please</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>gratis
electronic toothbrush that snoops on its user by
+ sending usage data back over the
Internet</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706204">
+ <p>Lots of “smart” products are
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in the house,</em></ins></span> all the
time</a>.</p>
- <p>Today's technological practice does not include any way of making
+ <span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
a device that can obey your voice commands without potentially spying
on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ about you for later examination.</p></em></ins></span>
</li>
-
- <span
class="removed"><del><strong><li><p>Nest</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
data about the user</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260">
- <p><a</em></ins></span>
+ <li id="M201310260">
+ <p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable the surveillance, even if it were not hidden as it was in
- these TVs, does not legitimize the surveillance.</p>
- </li>
-
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the
TV</strong></del></span>
-
-
-<span class="inserted"><ins><em><div class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareOnWearables">Wearables</h4>
<span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
@@ -2702,52 +2734,29 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This</em></ins></span> will <span
class="removed"><del><strong>say, “Without your consent to
tracking,</strong></del></span> <span
class="inserted"><ins><em>teach</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
- monitor every aspect of</em></ins></span> what
- <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
+ monitor every aspect of what they do.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
-
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="inserted"><ins><em>is certainly surveillance, at least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>report its
location</em></ins></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>someone else and</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
+ <li id="M201407090">
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
too</a>.</p>
</li>
</ul>
@@ -2760,77 +2769,61 @@
<ul class="blurbs">
<li id="M201903290">
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
- <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811300">
- <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
- cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<span class="removed"><del><strong>would then have to
+ give it</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>US or some
other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>driver's personal data goes with
+ them</a>.</p>
</li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
+
+ <li id="M201811300">
+ <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
+ cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless it is done
+ by free software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal</em></ins></span> that <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ transfers technical data, including car location,</em></ins></span>
+ to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches, and
+ the switch to turn</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>off has no effect. (The fact
that</strong></del></span> <span class="inserted"><ins><em>data</a> as
part of their own spying, then
+ forward it to</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span
class="removed"><del><strong>server</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+ <p>GM did not get users' consent, but it</em></ins></span> could
<span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>have got</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
- <p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
- </li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
- hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports a 404 error really means nothing; the server
- could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>easily by
+ sneaking</em></ins></span> it
+ <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this, but any product
+ <p>LG later said it had installed a patch to stop this, but any
product
could spy this way.</p>
<p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> <span class="inserted"><ins><em>won't collect
any</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p>
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do</strong></del></span> <span class="inserted"><ins><em>contract that users
sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect</em></ins></span> lots of <span
class="removed"><del><strong>spying anyway</a>.</p>
</li>
<li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span> <span class="inserted"><ins><em>other data:
listening</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareInGames -->
<div class="big-section">
@@ -2842,9 +2835,16 @@
<ul>
<li>
- <p>The driver for a certain gaming keyboard</strong></del></span>
+ <p>The driver for a certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em>you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
to China</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -2898,11 +2898,11 @@
<span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users</strong></del></span>
+ collect a wide range of</strong></del></span>
<span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow the company to extract
- data remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ <p>Tesla cars allow the company to extract</em></ins></span>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
@@ -2951,21 +2951,20 @@
<li><p>Users are suing Bose for
<a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>.
- Specifically, the app would record the names of the audio files
- users listen to along with the headphone's unique serial number.
- </p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave
consent</strong></del></span>
+ Specifically, the app would record</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
- creates the potential</em></ins></span> for <span
class="removed"><del><strong>this,
- would that make</strong></del></span> <span
class="inserted"><ins><em>the most intimate
- surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
- <a href="/philosophy/surveillance-vs-democracy.html">
- illegal</strong></del></span> <span
class="inserted"><ins><em>takes</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>make this potential real <a
-
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ creates</em></ins></span> the <span class="removed"><del><strong>names
of</strong></del></span> <span class="inserted"><ins><em>potential
for</em></ins></span> the <span class="removed"><del><strong>audio files
+ users listen</strong></del></span> <span class="inserted"><ins><em>most
intimate
+ surveillance ever. All it takes</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+ </p>
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that</strong></del></span> make <span
class="removed"><del><strong>it acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>this potential
real</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+ illegal to design</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
@@ -2996,6 +2995,17 @@
<li><p>When</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201901101">
<p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
@@ -3390,7 +3400,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:29 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- po/proprietary-surveillance.de.po 22 Apr 2019 11:01:29 -0000 1.279
+++ po/proprietary-surveillance.de.po 22 Apr 2019 12:00:08 -0000 1.280
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4389,6 +4389,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- po/proprietary-surveillance.fr.po 22 Apr 2019 11:41:32 -0000 1.412
+++ po/proprietary-surveillance.fr.po 22 Apr 2019 12:00:08 -0000 1.413
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2019-04-22 13:36+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3788,6 +3789,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/proprietary-surveillance.it-diff.html 22 Apr 2019 11:01:30 -0000
1.131
+++ po/proprietary-surveillance.it-diff.html 22 Apr 2019 12:00:08 -0000
1.132
@@ -1288,7 +1288,7 @@
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ recording all the users' actions</a> in
interacting</em></ins></span> with <span class="inserted"><ins><em>the
app.</p>
</li>
<li id="M201902041.1">
@@ -1303,7 +1303,8 @@
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>potential risk because
there is no easy way of knowing what they really do.</p>
</li>
@@ -1311,10 +1312,10 @@
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
+ 25% fail</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
@@ -1956,9 +1957,8 @@
</li>
<li id="M201511020">
- <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households</em></ins></span>
- to <span class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>the 600 millions
social media profiles the company
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
@@ -1968,26 +1968,26 @@
</li>
<li id="M201507240">
- <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="inserted"><ins><em><a
+ <p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>,</em></ins></span> even <span
class="removed"><del><strong>speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>if it isn't a TV channel.</p></em></ins></span>
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
+ record</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A computerized vibrator</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on <span class="inserted"><ins><em>what programs
people watch, and even what they wanted to
- record</a>.</p>
- </li>
-
- <li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ <span class="inserted"><ins><em><li id="M201504300">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
</li>
@@ -2007,16 +2007,18 @@
standard with which manufacturers would make statements about
their products, rather than</strong></del></span> free
software <span class="removed"><del><strong>which users could have
- checked and changed.</p></strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
+ checked and changed.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
- <li id="M201411090"></em></ins></span>
- <p>The <span class="removed"><del><strong>company that
made</strong></del></span> <span class="inserted"><ins><em>Amazon
“Smart” TV is <a
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
@@ -2044,137 +2046,136 @@
who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
user <span class="removed"><del><strong>was.</p>
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>watches—no exceptions!</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>watches—no
exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>company has been ordered</strong></del></span>
<span class="inserted"><ins><em>user watches, and the switch</em></ins></span>
to <span class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span class="removed"><del><strong>total of
C$4m</a>
- to its customers.</p>
- </li>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?</strong></del></span>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
-
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
-
- <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
collected by the manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product</em></ins></span> could <span class="removed"><del><strong>listen
to these conversations
+ <p>That</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen to these conversations
was unacceptable by itself.</p></li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>spy this way.</p>
-
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
- </li>
-
- <li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
- long-term.</p>
+Note</strong></del></span> <span class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact</em></ins></span> that the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
+ really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>means nothing; the server could save that data
anyway.)</p>
- <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
-
- <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
- at <span class="removed"><del><strong>Work</h3>
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
<div style="clear: left;"></div>
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
- </li>
-
- <li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
- <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
- name!</p>
+ <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>other devices on the user's local
network</a>.</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>can collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>had installed
a patch to stop this, but any
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span class="inserted"><ins><em>the
videos. That's not
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
+ <li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
@@ -2208,73 +2209,78 @@
<li id="M201511250"></em></ins></span>
<p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
-
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>, <span class="removed"><del><strong>even when the
“owner” switches it “off.”</p>
+ <p>A “smart” device means the manufacturer is using it
to outsmart
+ you.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
+<ul>
<li><p>E-books can contain Javascript code,
- and</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
- listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
- into one.</p></em></ins></span>
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span>
+ <span class="inserted"><ins><em>even when</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
+
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>e-reader used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711100">
- <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ needed</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
</li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two
users</a>.</p></em></ins></span>
- </li>
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li></strong></del></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
+ <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
+ anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication when
- accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
+ into one.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
@@ -2287,17 +2293,17 @@
products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing</em></ins></span>
the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>data may be
- true, but</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
modem enables</strong></del></span>
<span class="inserted"><ins><em>user was.</p>
@@ -2325,27 +2331,16 @@
payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
- <li><p>Tesla cars allow</strong></del></span>
+ <li><p>Tesla cars allow the company to extract data remotely and
+ determine</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
- conversations was unacceptable by itself.</p>
- </li>
-
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
- company <span class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>get the
data</strong></del></span> <span class="inserted"><ins><em>listen in on a
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>even speak
into</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data
+ and hand it over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -2363,14 +2358,25 @@
<li><p>Nest thermometers
send</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
@@ -2429,17 +2435,17 @@
these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
</li>
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon
device,
+ and</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
@@ -2584,16 +2590,17 @@
<p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition is not to be trusted unless
it</strong></del></span> <span class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will</strong></del></span> <span
class="inserted"><ins><em>movements, tracking passengers' cell
+ phones. <em>All</em> such data collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
<p>But if you really want</em></ins></span> to
<span class="removed"><del><strong>third parties</a>.</p>
@@ -2645,28 +2652,28 @@
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>built-in
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely and make changes in various
+ access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if it
asked</em></ins></span>
- for <span class="inserted"><ins><em>authentication, you couldn't be
confident that Nissan
- has no access. The software in the car is proprietary, <a
+ <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which means
- it demands blind faith from</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
+ it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>cell phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>audio
files
-users listen</strong></del></span> <span class="inserted"><ins><em>phone
company</em></ins></span> to <span class="removed"><del><strong>along with the
headphone's unique serial number.
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
</p>
-<p>The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>fine print of</strong></del></span> <span
class="inserted"><ins><em>car's movements all</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span
class="inserted"><ins><em>time;</em></ins></span>
+<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
<a href="/philosophy/surveillance-vs-democracy.html">
illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
@@ -2714,8 +2721,8 @@
also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter
of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the car.</p>
+ anonymous payment systems, but the invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>car.</p>
</li>
</ul>
@@ -2763,6 +2770,17 @@
<li><p>When</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201901101">
<p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
@@ -3121,7 +3139,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- po/proprietary-surveillance.it.po 22 Apr 2019 11:01:30 -0000 1.292
+++ po/proprietary-surveillance.it.po 22 Apr 2019 12:00:08 -0000 1.293
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -4159,6 +4159,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/proprietary-surveillance.ja-diff.html 22 Apr 2019 11:01:30 -0000
1.141
+++ po/proprietary-surveillance.ja-diff.html 22 Apr 2019 12:00:08 -0000
1.142
@@ -1286,30 +1286,55 @@
<p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>surrounded
by</strong></del></span> <span class="inserted"><ins><em>no way to
save</em></ins></span>
a <span class="removed"><del><strong>person's
- body), and</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>vibration frequency.</p>
+ body), and the vibration frequency.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>totally inadequate proposed response: a
labeling
+ standard with which manufacturers would make
statements</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>If you learn to care much less</em></ins></span> about
+ <span class="removed"><del><strong>their products, rather than free
software which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>adults.</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
- <li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
- standard with which manufacturers would make
statements</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied by researchers were found to snoop
- and collect information</em></ins></span> about <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This is evidence that proprietary apps generally work
against</em></ins></span>
- their <span class="removed"><del><strong>products, rather than free
software which users can check</strong></del></span> <span
class="inserted"><ins><em>users. To protect their privacy</em></ins></span>
and <span class="removed"><del><strong>change.</p></strong></del></span>
<span class="inserted"><ins><em>freedom, Android users
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>the
proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
the user if an app contains anti-features</a>.</p>
@@ -1328,7 +1353,7 @@
<li id="M201803050">
<p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ spy</em></ins></span> on <span class="removed"><del><strong>Windows
installs.</strong></del></span> <span class="inserted"><ins><em>users even more
than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
@@ -1347,7 +1372,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1930,11 +1955,10 @@
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p></em></ins></span>
+ user watches—no exceptions!</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li id="M201405200">
+ <li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
@@ -1943,12 +1967,20 @@
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
+ <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>patch to
stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -1956,107 +1988,75 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
- </li>
-</ul>
-
-
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
+ <li><p>Spyware in Skype:</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
-
- <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
- at <span class="removed"><del><strong>Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
- <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
@@ -2065,14 +2065,13 @@
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>the videos.
That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
<li id="M201603220">
@@ -2171,106 +2170,102 @@
<p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <p>Even if no one connects to the car
remotely,</strong></del></span> <span class="inserted"><ins><em>was
anonymizing</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>data
may be
- true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>time; it
is possible</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p>
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
</li>
- <li><p>Proprietary software in cars</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
others.</p>
<p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span
class="inserted"><ins><em>pay</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>total</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m</a>
to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+ really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>company to extract data remotely and
- determine</strong></del></span>
+ <li><p>Tesla cars allow</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>store it.</p>
+ conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
+ company <span class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
- </li>
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201502180">
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>joke: The</strong></del></span> <span
class="inserted"><ins><em>DJI drone
- to snoop on</em></ins></span> other <span class="removed"><del><strong>day
a woman came up</strong></del></span> <span class="inserted"><ins><em>people,
DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -2301,42 +2296,42 @@
turn it into a listening device</a> for them.</p>
<p>It</em></ins></span> was <span class="inserted"><ins><em>very
difficult for them to do this. The job would be much
- easier for Amazon. And if some government such</em></ins></span> as <span
class="removed"><del><strong>of 2014,</strong></del></span> <span
class="inserted"><ins><em>China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ easier for Amazon. And if some government such</em></ins></span> as <span
class="removed"><del><strong>of 2014, but we don't expect this has got
better.</p>
- <p>These crackers are probably hackers too,</em></ins></span> but
<span class="removed"><del><strong>we</strong></del></span> <span
class="inserted"><ins><em>please <a
- href="https://stallman.org/articles/on-hacking.html"></em></ins></span>
don't <span class="removed"><del><strong>expect this has got better.</p>
-
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>use
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>China or the US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em>country,
+ do you think Amazon would have the moral fiber</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
“hacking” to mean “breaking
security”</a>.</p>
</li>
<li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>laws requiring</strong></del></span> <span
class="inserted"><ins><em>snoops on its user by
- sending usage data back over the Internet</a>.</p>
+ offers</em></ins></span> a <span class="inserted"><ins><em>gratis
electronic toothbrush that snoops on its</em></ins></span> user <span
class="removed"><del><strong>declines consent? Probably</strong></del></span>
<span class="inserted"><ins><em>by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart”</em></ins></span> products <span
class="inserted"><ins><em>are designed <a
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>get users'
formal
- consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>everyone in the house, all the
time</a>.</p>
+ listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
+ a device that can obey</em></ins></span> your <span
class="removed"><del><strong>consent</strong></del></span> <span
class="inserted"><ins><em>voice commands without potentially spying
on you. Even if it is air-gapped, it could be saving up records
about you for later examination.</p>
</li>
<li id="M201407170">
<p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot
of</em></ins></span>
- data <span class="removed"><del><strong>are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
</li>
<li id="M201310260">
@@ -2403,8 +2398,8 @@
picked up by proprietary malware running on other devices in
range so as</strong></del></span> <span class="inserted"><ins><em>report
its location</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>someone else and to transmit conversations
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>someone else</em></ins></span> and
+ <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
too</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
@@ -2419,16 +2414,17 @@
<ul class="blurbs">
<li id="M201903290">
<p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
+ even if</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span
class="inserted"><ins><em>junkyard the driver's personal data goes with
- them</a>.</p></em></ins></span>
+ when they go to a junkyard the driver's personal data goes with
+ them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201811300">
- <p>In China, it is mandatory for electric
- cars to be equipped with a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ <li id="M201811300">
+ <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
watching and listening all</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
@@ -2465,42 +2461,41 @@
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p></em></ins></span>
+ track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <span class="inserted"><ins><em><li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ <li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li id="M201602240">
+ <span class="inserted"><ins><em><li id="M201602240">
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and
- <span class="removed"><del><strong>the switch</strong></del></span>
<span class="inserted"><ins><em>make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>turn this off</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
+ <p>That's easy to do because the system has no authentication
when accessed through the modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan</em></ins></span>
- has no <span class="removed"><del><strong>effect. (The fact
that</strong></del></span> <span class="inserted"><ins><em>access. The
software in</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
-
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
means <span class="removed"><del><strong>nothing; the server
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software</em></ins></span> in <span
class="inserted"><ins><em>the car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>user watches, and</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ enables</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>phone company</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact that the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>server
could save that data anyway.)</p>
- <p>Even worse,</strong></del></span>
- it
- <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>demands blind faith from its
users</a>.</p>
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>car's movements all</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
- <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company to track the car's movements all the
time;</em></ins></span>
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>time;</em></ins></span>
it <span class="removed"><del><strong>had installed a
patch</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span class="removed"><del><strong>stop this, but
any product
could spy this way.</p>
@@ -2517,7 +2512,9 @@
<!-- #SpywareAtPlay -->
<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <h3 id="SpywareAtPlay">Spyware</strong></del></span> <span
class="inserted"><ins><em>extract
+ data remotely and determine the car's location</em></ins></span>
+ at <span class="removed"><del><strong>Play</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2525,44 +2522,40 @@
<ul>
<li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>extract
- data remotely</em></ins></span> and <span
class="removed"><del><strong>report to</strong></del></span> <span
class="inserted"><ins><em>determine</em></ins></span> the
+ video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>any time. (See Section 2, paragraphs
b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
- a nonfree operating system.</p>
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p></em></ins></span>
</li>
- <li><p>Modern gratis game cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range</strong></del></span> <span
class="inserted"><ins><em>c</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
- friends and associates</a>.</p>
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>the <a
-
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
- information, but if the state orders it to get</em></ins></span> the data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201303250">
+ <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information</em></ins></span> about <span
class="removed"><del><strong>their users and their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>drivers'
movements</a>, which is made
+ available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>associates</a>.</p>
- <li id="M201303250">
- <p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
- companies.</p>
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>others.</p>
- <p>They use this data to manipulate people</strong></del></span>
- <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
-
- <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter
of proprietary surveillance. These systems
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the car.</p>
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
+ collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
+ other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
+ companies.</p>
+
+ <p>They use this data to manipulate people to buy things, and hunt
+ for “whales” who can be led to spend a lot of money. They
+ also use a back door to manipulate</strong></del></span> <span
class="inserted"><ins><em>proprietary malware in</em></ins></span> the <span
class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>car.</p>
</li>
</ul>
@@ -2610,6 +2603,17 @@
<li><p>Online</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201901101">
<p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
@@ -2960,7 +2964,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- po/proprietary-surveillance.ja.po 22 Apr 2019 11:01:30 -0000 1.265
+++ po/proprietary-surveillance.ja.po 22 Apr 2019 12:00:08 -0000 1.266
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3537,6 +3537,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- po/proprietary-surveillance.pot 22 Apr 2019 11:01:30 -0000 1.213
+++ po/proprietary-surveillance.pot 22 Apr 2019 12:00:08 -0000 1.214
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2583,6 +2583,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a "
+"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk\">no
"
+"longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
+"href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
"
+"users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, "
+"Microsoft Edge and also in the upcoming Microsoft Edge that going to be "
+"based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a "
"href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\">
"
"sent the precise GPS location to Twitter's server</a>. It still contains "
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.509
retrieving revision 1.510
diff -u -b -r1.509 -r1.510
--- po/proprietary-surveillance.ru.po 22 Apr 2019 11:29:52 -0000 1.509
+++ po/proprietary-surveillance.ru.po 22 Apr 2019 12:00:08 -0000 1.510
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3741,6 +3742,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- po/proprietary.de-diff.html 22 Apr 2019 11:01:30 -0000 1.84
+++ po/proprietary.de-diff.html 22 Apr 2019 12:00:08 -0000 1.85
@@ -46,13 +46,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -247,14 +258,6 @@
<p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
-
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- po/proprietary.de.po 22 Apr 2019 11:01:30 -0000 1.126
+++ po/proprietary.de.po 22 Apr 2019 12:00:08 -0000 1.127
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -540,15 +551,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- po/proprietary.es.po 22 Apr 2019 11:01:30 -0000 1.151
+++ po/proprietary.es.po 22 Apr 2019 12:00:08 -0000 1.152
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -395,20 +406,6 @@
"Un software privativo presente en el teléfono debe de ser el responsable de "
"enviar los datos de localización a Google."
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-"En un teléfono Android se ha observado que rastreaba la localización
incluso "
-"en modo avión. Mientras estaba en modo avión no enviaba los datos de "
-"localización. En lugar de eso, <a href=\"https://www.thesun.co.uk/"
-"tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"
-"\">guardaba los datos y los enviaba después</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -488,6 +485,19 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "An Android phone was observed to track location even while in airplane "
+#~ "mode. It didn't send the location data while in airplane mode. Instead, "
+#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-"
+#~ "even-with-airplane-mode-turned-on/\"> it saved up the data, and sent them "
+#~ "all later</a>."
+#~ msgstr ""
+#~ "En un teléfono Android se ha observado que rastreaba la localización "
+#~ "incluso en modo avión. Mientras estaba en modo avión no enviaba los
datos "
+#~ "de localización. En lugar de eso, <a href=\"https://www.thesun.co.uk/"
+#~ "tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"
+#~ "\">guardaba los datos y los enviaba después</a>."
+
+#~ msgid ""
#~ "Ebooks “bought” from Microsoft's store check that their DRM "
#~ "is valid by connecting to the store every time their “owner” "
#~ "wants to read them. Microsoft is going to close this store, <a href="
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary.fr.po 22 Apr 2019 11:41:32 -0000 1.186
+++ po/proprietary.fr.po 22 Apr 2019 12:00:08 -0000 1.187
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2019-04-22 13:36+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -423,20 +435,6 @@
"Ce doit être un logiciel non libre présent dans le téléphone qui envoie
ces "
"données à Google."
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-"On a constaté que le GPS d'un certain téléphone Android fonctionnait même
en "
-"mode avion. Les données de géolocalisation n'étaient pas envoyées sur le "
-"moment, mais <a href=\"https://www.thesun.co.uk/tech/7811918/google-is-"
-"tracking-you-even-with-airplane-mode-turned-on/\">sauvegardées et envoyées "
-"plus tard</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,6 +510,19 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "An Android phone was observed to track location even while in airplane "
+#~ "mode. It didn't send the location data while in airplane mode. Instead, "
+#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-"
+#~ "even-with-airplane-mode-turned-on/\"> it saved up the data, and sent them "
+#~ "all later</a>."
+#~ msgstr ""
+#~ "On a constaté que le GPS d'un certain téléphone Android fonctionnait
même "
+#~ "en mode avion. Les données de géolocalisation n'étaient pas envoyées
sur "
+#~ "le moment, mais <a href=\"https://www.thesun.co.uk/tech/7811918/google-is-"
+#~ "tracking-you-even-with-airplane-mode-turned-on/\">sauvegardées et "
+#~ "envoyées plus tard</a>."
+
+#~ msgid ""
#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/proprietary.it-diff.html 22 Apr 2019 11:01:30 -0000 1.96
+++ po/proprietary.it-diff.html 22 Apr 2019 12:00:08 -0000 1.97
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -246,14 +257,6 @@
<p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
-
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
- </li>
</ul></em></ins></span>
@@ -314,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/proprietary.it.po 22 Apr 2019 11:01:30 -0000 1.135
+++ po/proprietary.it.po 22 Apr 2019 12:00:08 -0000 1.136
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -517,15 +528,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- po/proprietary.ja-diff.html 22 Apr 2019 11:01:30 -0000 1.97
+++ po/proprietary.ja-diff.html 22 Apr 2019 12:00:08 -0000 1.98
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -181,6 +181,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -243,14 +254,6 @@
<p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
-
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- po/proprietary.ja.po 22 Apr 2019 11:01:30 -0000 1.118
+++ po/proprietary.ja.po 22 Apr 2019 12:00:08 -0000 1.119
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -450,15 +461,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/proprietary.nl-diff.html 22 Apr 2019 11:01:30 -0000 1.96
+++ po/proprietary.nl-diff.html 22 Apr 2019 12:00:08 -0000 1.97
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -246,14 +257,6 @@
<p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
-
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
- </li>
</ul></em></ins></span>
@@ -314,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- po/proprietary.nl.po 22 Apr 2019 11:01:30 -0000 1.107
+++ po/proprietary.nl.po 22 Apr 2019 12:00:08 -0000 1.108
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -510,15 +521,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- po/proprietary.pl-diff.html 22 Apr 2019 11:01:30 -0000 1.114
+++ po/proprietary.pl-diff.html 22 Apr 2019 12:00:08 -0000 1.115
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -126,17 +126,17 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -182,6 +182,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -244,14 +255,6 @@
<p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
-
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
- </li>
</ul></em></ins></span>
@@ -312,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/proprietary.pl.po 22 Apr 2019 11:01:30 -0000 1.102
+++ po/proprietary.pl.po 22 Apr 2019 12:00:08 -0000 1.103
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -592,15 +603,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- po/proprietary.pot 22 Apr 2019 11:01:30 -0000 1.99
+++ po/proprietary.pot 22 Apr 2019 12:00:08 -0000 1.100
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a "
+"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk\">no
"
+"longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
+"href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
"
+"users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, "
+"Microsoft Edge and also in the upcoming Microsoft Edge that going to be "
+"based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a "
"href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\">
"
"available to employers and insurance companies</a>. Even though the data is "
@@ -327,14 +338,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane "
-"mode. It didn't send the location data while in airplane mode. Instead, <a "
-"href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/\">
"
-"it saved up the data, and sent them all later</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- po/proprietary.pt-br.po 22 Apr 2019 11:01:30 -0000 1.145
+++ po/proprietary.pt-br.po 22 Apr 2019 12:00:08 -0000 1.146
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2019-04-16 00:31-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -298,6 +298,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -380,15 +391,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/proprietary.ru.po 22 Apr 2019 11:29:52 -0000 1.225
+++ po/proprietary.ru.po 22 Apr 2019 12:00:08 -0000 1.226
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -425,19 +437,6 @@
msgstr ""
"Ðа оÑÑÑÐ»ÐºÑ Ð´Ð°Ð½Ð½ÑÑ
в Google в ÑелеÑоне должнÑ
оÑвеÑаÑÑ Ð½ÐµÑвободнÑе пÑогÑаммÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-"ÐÑло обнаÑÑжено, ÑÑо ÑелеÑон на базе Android
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¼ÐµÑÑоположение даже "
-"в Ñежиме полеÑа. Ð ÑÑом Ñежиме даннÑе Ð¾Ñ Ð½Ðµ
оÑÑÑлал. ÐмеÑÑо ÑÑого <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> Ð¾Ñ ÑоÑ
ÑанÑл даннÑе и
оÑÑÑлал иÑ
впоÑледÑÑвии</a>."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -517,6 +516,19 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "An Android phone was observed to track location even while in airplane "
+#~ "mode. It didn't send the location data while in airplane mode. Instead, "
+#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-"
+#~ "even-with-airplane-mode-turned-on/\"> it saved up the data, and sent them "
+#~ "all later</a>."
+#~ msgstr ""
+#~ "ÐÑло обнаÑÑжено, ÑÑо ÑелеÑон на базе Android
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¼ÐµÑÑоположение "
+#~ "даже в Ñежиме полеÑа. Ð ÑÑом Ñежиме
даннÑе Ð¾Ñ Ð½Ðµ оÑÑÑлал. ÐмеÑÑо ÑÑого <a "
+#~ "href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-"
+#~ "with-airplane-mode-turned-on/\"> Ð¾Ñ ÑоÑ
ÑанÑл даннÑе и
оÑÑÑлал иÑ
"
+#~ "впоÑледÑÑвии</a>."
+
+#~ msgid ""
#~ "Ebooks “bought” from Microsoft's store check that their DRM "
#~ "is valid by connecting to the store every time their “owner” "
#~ "wants to read them. Microsoft is going to close this store, <a href="
Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary.zh-tw-diff.html 22 Apr 2019 11:01:30 -0000 1.74
+++ po/proprietary.zh-tw-diff.html 22 Apr 2019 12:00:09 -0000 1.75
@@ -46,13 +46,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904210">
+ <p>As of April 2019, It is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+ going to be based on Chromium.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -247,14 +258,6 @@
<p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
-
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:09 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- po/proprietary.zh-tw.po 22 Apr 2019 11:01:30 -0000 1.85
+++ po/proprietary.zh-tw.po 22 Apr 2019 12:00:09 -0000 1.86
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -426,15 +437,6 @@
"data to Google."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode. Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- po/pt-br.po 22 Apr 2019 11:01:30 -0000 1.97
+++ po/pt-br.po 22 Apr 2019 12:00:09 -0000 1.98
@@ -6731,6 +6731,17 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- po/ru.po 22 Apr 2019 11:07:19 -0000 1.165
+++ po/ru.po 22 Apr 2019 12:00:09 -0000 1.166
@@ -6155,11 +6155,12 @@
"companies</a>. Even though the data is “anonymized and aggregated,"
"” it can easily be traced back to the woman who uses the app."
msgstr ""
-"ÐаннÑе, ÑобиÑаемÑе пÑиложениÑми
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° менÑÑÑÑаÑией и
беÑеменноÑÑÑÑ, ÑаÑÑо <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> доÑÑÑпнÑ
ÑабоÑодаÑелÑм и ÑÑÑаÑ
овÑм "
-"компаниÑм</a>. ХоÑÑ Ð´Ð°Ð½Ð½Ñе
“анонимизиÑÑÑÑÑÑ Ð¸ ÑÑммиÑÑÑÑÑÑ”, "
-"иÑ
легко оÑÑледиÑÑ Ð´Ð¾ женÑинÑ, коÑоÑаÑ
полÑзÑеÑÑÑ Ð¿Ñиложением."
+"ÐаннÑе, ÑобиÑаемÑе пÑиложениÑми
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° менÑÑÑÑаÑией и
беÑеменноÑÑÑÑ, "
+"ÑаÑÑо <a
href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-"
+"side-to-womens-health-apps-menstrual-surveillance\"> доÑÑÑпнÑ
ÑабоÑодаÑелÑм "
+"и ÑÑÑаÑ
овÑм компаниÑм</a>. ХоÑÑ Ð´Ð°Ð½Ð½Ñе
“анонимизиÑÑÑÑÑÑ Ð¸ "
+"ÑÑммиÑÑÑÑÑÑ”, иÑ
легко оÑÑледиÑÑ Ð´Ð¾
женÑинÑ, коÑоÑÐ°Ñ Ð¿Ð¾Ð»ÑзÑеÑÑÑ "
+"пÑиложением."
#. type: Content of: <ul><li><p>
msgid ""
@@ -6190,6 +6191,7 @@
"Ð½ÐµÑ Ð¿ÑÑмого доÑÑÑпа к даннÑм. ÐÑо пÑиводиÑ
к маÑÑовой Ñлежке, над коÑоÑой Ñ "
"полÑзоваÑÐµÐ»Ñ Ð½ÐµÑ Ð°Ð±ÑолÑÑно никакого
конÑÑолÑ."
+#. type: Content of: <ul><li><p>
msgid ""
"A study of 24 “health” apps found that 19 of them <a href="
"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
@@ -8994,6 +8996,17 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/zh-tw.po 22 Apr 2019 11:01:30 -0000 1.75
+++ po/zh-tw.po 22 Apr 2019 12:00:09 -0000 1.76
@@ -6322,6 +6322,17 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-microsoft.fr.html malwa...,
GNUN <=