[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 27 Apr 2019 15:30:07 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/04/27 15:30:05
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-amazon.de-diff.html
malware-amazon.de.po malware-amazon.es.po
malware-amazon.fr.po
malware-amazon.it-diff.html
malware-amazon.it.po
malware-amazon.ja-diff.html
malware-amazon.ja.po malware-amazon.pot
malware-amazon.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.419&r2=1.420
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.514&r2=1.515
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.79&r2=1.80
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- de.po 26 Apr 2019 12:00:37 -0000 1.79
+++ de.po 27 Apr 2019 19:30:03 -0000 1.80
@@ -539,6 +539,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- es.po 27 Apr 2019 12:00:18 -0000 1.105
+++ es.po 27 Apr 2019 19:30:03 -0000 1.106
@@ -405,6 +405,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- fr.po 26 Apr 2019 17:26:14 -0000 1.138
+++ fr.po 27 Apr 2019 19:30:03 -0000 1.139
@@ -416,6 +416,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- it.po 26 Apr 2019 12:00:38 -0000 1.79
+++ it.po 27 Apr 2019 19:30:03 -0000 1.80
@@ -492,6 +492,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- ja.po 26 Apr 2019 12:00:38 -0000 1.79
+++ ja.po 27 Apr 2019 19:30:03 -0000 1.80
@@ -448,6 +448,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-amazon.de-diff.html 4 Mar 2019 09:00:09 -0000 1.19
+++ malware-amazon.de-diff.html 27 Apr 2019 19:30:03 -0000 1.20
@@ -63,13 +63,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p>
-</div></em></ins></span>
+to serve as specific substantiation.</p></em></ins></span>
</div>
<span class="removed"><del><strong><h2</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><p class="c" style="font-size: 1.2em">
+<p class="c" style="font-size: 1.2em">
<a href="#swindle">Kindle Swindle</a>
<a href="#echo">Echo</a>
<a href="#misc">Other products</a>
@@ -207,6 +207,25 @@
<span class="inserted"><ins><em><h4
id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -329,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 09:00:09 $
+$Date: 2019/04/27 19:30:03 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-amazon.de.po 4 Mar 2019 09:00:09 -0000 1.23
+++ malware-amazon.de.po 27 Apr 2019 19:30:03 -0000 1.24
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2017-09-26 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -280,6 +280,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-amazon.es.po 4 Mar 2019 13:30:43 -0000 1.30
+++ malware-amazon.es.po 27 Apr 2019 19:30:03 -0000 1.31
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-03-04 13:58+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -212,6 +213,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-amazon.fr.po 31 Mar 2019 11:07:09 -0000 1.35
+++ malware-amazon.fr.po 27 Apr 2019 19:30:03 -0000 1.36
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-03-31 13:02+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -208,6 +209,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-amazon.it-diff.html 4 Mar 2019 09:00:10 -0000 1.33
+++ malware-amazon.it-diff.html 27 Apr 2019 19:30:03 -0000 1.34
@@ -63,13 +63,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p>
-</div></em></ins></span>
+to serve as specific substantiation.</p></em></ins></span>
</div>
<span class="removed"><del><strong><h2</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><p class="c" style="font-size: 1.2em">
+<p class="c" style="font-size: 1.2em">
<a href="#swindle">Kindle Swindle</a>
<a href="#echo">Echo</a>
<a href="#misc">Other products</a>
@@ -207,6 +207,25 @@
<span class="inserted"><ins><em><h4
id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -329,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 09:00:10 $
+$Date: 2019/04/27 19:30:03 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-amazon.it.po 4 Mar 2019 09:00:10 -0000 1.26
+++ malware-amazon.it.po 27 Apr 2019 19:30:03 -0000 1.27
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -258,6 +258,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-amazon.ja-diff.html 4 Mar 2019 09:00:10 -0000 1.30
+++ malware-amazon.ja-diff.html 27 Apr 2019 19:30:03 -0000 1.31
@@ -196,6 +196,25 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -318,7 +337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 09:00:10 $
+$Date: 2019/04/27 19:30:03 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-amazon.ja.po 4 Mar 2019 09:00:10 -0000 1.17
+++ malware-amazon.ja.po 27 Apr 2019 19:30:04 -0000 1.18
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2016-10-31 11:24+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -227,6 +227,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-amazon.pot 4 Mar 2019 09:00:10 -0000 1.16
+++ malware-amazon.pot 27 Apr 2019 19:30:04 -0000 1.17
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -154,6 +154,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a "
+"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
+"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
+"assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a "
+"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\">
"
+"location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
+"cloud</a>” (a soothing way of saying “We won't tell you how and "
+"where it's done”), users have no way to know what happens to the "
+"recordings unless human eavesdroppers <a "
+"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\">
"
+"break their non-disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a "
"href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
"into a listening device</a> for them."
Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- malware-amazon.ru.po 4 Mar 2019 09:29:52 -0000 1.39
+++ malware-amazon.ru.po 27 Apr 2019 19:30:04 -0000 1.40
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2018-10-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -209,6 +210,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- nl.po 26 Apr 2019 12:00:38 -0000 1.79
+++ nl.po 27 Apr 2019 19:30:04 -0000 1.80
@@ -385,6 +385,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- pl.po 26 Apr 2019 12:00:38 -0000 1.79
+++ pl.po 27 Apr 2019 19:30:04 -0000 1.80
@@ -339,6 +339,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- pot 26 Apr 2019 12:00:38 -0000 1.79
+++ pot 27 Apr 2019 19:30:04 -0000 1.80
@@ -296,6 +296,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary-surveillance.de-diff.html 26 Apr 2019 12:00:38 -0000
1.68
+++ proprietary-surveillance.de-diff.html 27 Apr 2019 19:30:04 -0000
1.69
@@ -1155,11 +1155,11 @@
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>after
going</em></ins></span> to <span class="removed"><del><strong>read logs
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>read logs
for other</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
@@ -1208,14 +1208,14 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>non-premium version</strong></del></span>
<span class="inserted"><ins><em>responsibility for the injustice of their being
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="inserted"><ins><em>preventing apps from
+ <p>Could Google</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
@@ -1253,15 +1253,13 @@
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that <span
class="removed"><del><strong>they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps</strong></del></span> <span
class="inserted"><ins><em>they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
+ <p>A study found 234 Android apps that <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
@@ -1281,7 +1279,7 @@
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said</em></ins></span> that <span
class="removed"><del><strong>track</strong></del></span> users <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>gave consent for this,
+ If the fine print of the app said that</em></ins></span> users <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>gave consent for this,
would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from
beacons placed in stores or played by TV programs</a>.
</p></strong></del></span> <span class="inserted"><ins><em>design
@@ -1334,18 +1332,19 @@
<li id="M201701210">
<p>The Meitu photo-editing app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"></strong></del></span>
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app</em></ins></span> tracks <span
class="removed"><del><strong>the users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
yet another</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
<p>This</em></ins></span> example <span
class="removed"><del><strong>of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how
“getting</em></ins></span> the <span class="removed"><del><strong>user,
@@ -1355,66 +1354,103 @@
massive surveillance.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
<span class="inserted"><ins><em><li id="M201611160">
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy</em></ins></span>
and <span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>most popular</strong></del></span> <span
class="inserted"><ins><em>privacy and security of
+ 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps
+ <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>concluded
that “in spite of the promises
+ for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>anonymity given by the majority of VPN
+ apps—millions</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third parties.</p>
</li>
- <li><p>“Cryptic communication,” unrelated to the
app's functionality,
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>may be
unawarely subject</em></ins></span> to <span class="inserted"><ins><em>poor
security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list, taken from</em></ins></span>
the <span class="removed"><del><strong>app's functionality,
was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis</strong></del></span>
- <span class="inserted"><ins><em>283</em></ins></span> Android <span
class="removed"><del><strong>apps</a>.</p>
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>research paper,
+ of some proprietary VPN</em></ins></span> apps <span
class="inserted"><ins><em>that track users and infringe their
+ privacy:</p>
- <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="removed"><del><strong>as
- “free”—they are not free software. The clear way to say
+ <dl class="compact">
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such</em></ins></span> as
+ <span class="removed"><del><strong>“free”—they are not
free software. The clear way</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>say
“zero price” is “gratis.”</p>
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>concluded</em></ins></span> that <span
class="inserted"><ins><em>“in spite of</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what</strong></del></span> <span class="inserted"><ins><em>promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of</em></ins></span> users <span
class="removed"><del><strong>are doing or how. “Analytics” tools
that snoop are
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full access to users'
+ text messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs</em></ins></span>
+ for <span class="removed"><del><strong>granted
that</strong></del></span> <span class="inserted"><ins><em>other apps and also
core system logs. TigerVPN developers have
+ confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ may turn them over to the UK government if requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>HTML pages
returned</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
just as wrong as any other snooping.</p>
</li>
<li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span class="inserted"><ins><em>may be
unawarely subject</em></ins></span> to <span class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>poor security
- guarantees</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on the average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>abusive practices inflicted by VPN
apps.”</p>
-
- <p>Following</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are sold.
- Some Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
- </li>
-
- <li><p>Some manufacturers add</strong></del></span> a
- <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
- privacy:</p>
+ connect</strong></del></span> <span class="inserted"><ins><em>the
+ users. The stated purpose of the JS injection is</em></ins></span> to
<span class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
- <dl class="compact">
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries</em></ins></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>also uses
roughly
+ five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
+ the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection for
+ tracking the user and displaying ads.</dd>
+ </dl></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606050">
+ <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>picture you take according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
@@ -1424,209 +1460,189 @@
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>who is</em></ins></span>
+ in <span class="removed"><del><strong>iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="inserted"><ins><em>show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong><a
+ <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span> <span class="inserted"><ins><em>has full
access</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
+ illegal</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would</strong></del></span> require <span
class="removed"><del><strong>circumventing</strong></del></span> <span
class="inserted"><ins><em>online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p>
</li>
- <li><p>In the latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>users'
- text messages.</dd>
+ <li><p>In</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's
servers</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ algorithms.</p>
- <dt>DroidVPN</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>TigerVPN</dt>
- <dd>Requests</em></ins></span> the
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if</em></ins></span> the
<span class="removed"><del><strong>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em><code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p>
+ A more advanced way really does turn</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload”</em></ins></span>
them <span class="removed"><del><strong>off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
to <span class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>the
service.</p></em></ins></span>
</li>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>read logs
- for other apps and also core system logs. TigerVPN developers have
- confirmed this.</dd>
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
- <dt>HideMyAss</dt>
- <dd>Sends traffic</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>stores detailed logs and
- may turn them over</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>UK government if requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection</em></ins></span> is <span
class="removed"><del><strong>snooping on
+ <span class="inserted"><ins><em><li id="M201605310">
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>or watching</a>. In addition,</em></ins></span>
+ it <span class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>tell
whether the phone is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span class="inserted"><ins><em>to display
ads. Uses
- roughly five tracking libraries. Also, it redirects the user's
- traffic through valueclick.com (an advertising website).</dd>
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p>
+ </li>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
- get them from there.</p>
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> data <span
class="removed"><del><strong>to Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and
in server accounts,
+ it</em></ins></span> can
+ <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>alter</em></ins></span> them <span
class="removed"><del><strong>from there.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
</li>
- <li><p>The iMessage</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> app <span
class="removed"><del><strong>on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</strong></del></span> <span
class="inserted"><ins><em>have confirmed</em></ins></span> that
- the <span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>non-premium
version of</em></ins></span> the <span class="removed"><del><strong>server
records these numbers</strong></del></span> <span class="inserted"><ins><em>app
does JavaScript injection</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>the user types into it</a>; the server
records these numbers for at least 30
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
+ <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>include</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <li><p>Around 47% of</strong></del></span>
- <span class="inserted"><ins><em>tracking</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p></strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
- </dl></em></ins></span>
+ <li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated</em></ins></span> to <span class="removed"><del><strong>install
even</strong></del></span> <span class="inserted"><ins><em>the app's
functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular</em></ins></span> gratis <span
class="removed"><del><strong>apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Around</strong></del></span>
- <span class="inserted"><ins><em><li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</em></ins></span>
- all <span class="removed"><del><strong>the photos and
+ <span class="inserted"><ins><em><li id="M201510300">
+ <p>More than 73% and</em></ins></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, from Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
+ personal, behavioral and location information</a> of their users with
+ third parties.</p>
+ </li>
+
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
videos they make.</p>
<blockquote><p>
- iCloud</strong></del></span> <span
class="inserted"><ins><em>conversations</a>.</p>
- </li>
-
- <li id="M201606050">
- <p>Facebook's new Magic</em></ins></span> Photo <span
class="removed"><del><strong>Library stores every</strong></del></span> <span
class="inserted"><ins><em>app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's</em></ins></span> photo <span
class="inserted"><ins><em>collections for known
faces</a>,</em></ins></span>
- and <span class="removed"><del><strong>video</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>take,
- and keeps them up</strong></del></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits</strong></del></span> <span class="inserted"><ins><em>share
the picture</em></ins></span> you <span class="removed"><del><strong>make are
automatically updated everywhere. [...]
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>take according to
who</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
- <span class="inserted"><ins><em>in</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud”</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which</em></ins></span> means
- <span class="removed"><del><strong>“please don't ask
where.”</p>
+ <p>There</strong></del></span>
- <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>the pictures are likely</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as a
+ <span class="inserted"><ins><em><li id="M201508210">
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>still counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
- even if the user didn't “upload” them</em></ins></span> to
<span class="inserted"><ins><em>the service.</p>
- </li>
-
- <li id="M201605310">
- <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They
needed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>or
watching</a>. In addition,
- it may be analyzing people's conversations</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any
of</strong></del></span> <span
class="inserted"><ins><em>serve</em></ins></span> them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>with targeted
- advertisements.</p>
- </li>
-
- <li id="M201604250">
- <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ <p>Unknown people apparently took advantage of this
to</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data</em></ins></span> in <span
class="removed"><del><strong>iThings:
+ <li><p>Spyware in iThings:
the <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span
class="inserted"><ins><em>phone,</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>in server
accounts,
- it can alter them too</a>.</p></em></ins></span>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps that include <a
-
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on
various</em></ins></span> sites
- <span class="inserted"><ins><em>such as Facebook, Google+ and
Twitter.</p>
+ <li><p>There is also a feature for web sites to track users,
which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span class="inserted"><ins><em>some are starting
+ to realize that</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
</li>
- <li id="M201511190">
- <p>“Cryptic communication,”
- unrelated</em></ins></span> to <span class="removed"><del><strong>track
users, which is</strong></del></span> <span class="inserted"><ins><em>the app's
functionality, was</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span
class="inserted"><ins><em>should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
- <p>The article takes for granted that the usual analytics tools are
- legitimate,</em></ins></span> but <span
class="removed"><del><strong>it</strong></del></span> is <span
class="removed"><del><strong>still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span> that <span class="removed"><del><strong>can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ <p>This article shows the</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</em></ins></span> that <span class="removed"><del><strong>can
be
+ turned off.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>they present snooping as a way to “serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>attitude of the proprietary software industry
+ towards those they have subjugated.</p>
- <span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and 47% of mobile applications, from
Android</em></ins></span> and <span class="removed"><del><strong>regularly
does,</strong></del></span> <span class="inserted"><ins><em>iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
- third parties.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
+ Either Apple helps</strong></del></span>
- <span class="inserted"><ins><em><li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based</em></ins></span> on <span class="removed"><del><strong>all the data
in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>proprietary
malware (DRM and snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
+ <span class="inserted"><ins><em><li id="M201506264">
+ <p><a
+
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
+ study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>paid
+ proprietary apps,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>, and some are starting
- to realize that it</em></ins></span> is <span
class="inserted"><ins><em>nasty.</p>
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>was only 60%.</p>
- <p>This article shows</em></ins></span> the <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ <p>The article confusingly describes gratis apps as
+ “free”, but most</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span
class="inserted"><ins><em>them are not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses
the
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span>
+ is <span class="removed"><del><strong>the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1635,21 +1651,10 @@
</div>
<ul>
- <li><p>Tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary</em></ins></span>
software <span class="inserted"><ins><em>industry
- towards those they have subjugated.</p>
+ <li><p>Tracking software in popular</strong></del></span>
- <p>Out, out, damned Spotify!</p>
- </li>
-
- <li id="M201506264">
- <p><a
-
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study</em></ins></span> in <span
class="removed"><del><strong>popular</strong></del></span> <span
class="inserted"><ins><em>2015</a> found that 90% of the top-ranked
gratis proprietary</em></ins></span>
- Android apps <span class="removed"><del><strong>is pervasive and
+ <span class="inserted"><ins><em><li id="M201505060">
+ <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -1658,21 +1663,10 @@
<li><p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services”</strong></del></span> <span
class="inserted"><ins><em>contained recognizable tracking libraries. For the
paid
- proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as
- “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>turned off, even
- when</strong></del></span> <span class="inserted"><ins><em>not in fact
<a
- href="/philosophy/free-sw.html">free software</a>. It also
uses</em></ins></span> the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
- <li><p>Some portable phones</strong></del></span>
- <span class="inserted"><ins><em>ugly word “monetize”. A good
replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
- </li>
-
- <li id="M201505060">
- <p>Gratis Android apps (but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to
China</a>.</p></li>
<li><p>According</strong></del></span>
@@ -1720,104 +1714,85 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command</strong></del></span>
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M201411260">
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</em></ins></span> and
<span class="removed"><del><strong>users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>optional</a>.
Not
- as bad as what the others do.</p>
- </li>
-
- <li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
(The US says it will eventually require all new portable phones
to have GPS.)</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201312270">
+ <span class="inserted"><ins><em><li id="M201401150.1">
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
+ </li>
+
+ <li id="M201312270">
<p>The</em></ins></span> nonfree Snapchat app's principal purpose is
to restrict the
use of data on the user's computer, but it does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get the user's list of other people's phone
<span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>numbers</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em>numbers</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312060"></em></ins></span>
- <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Brightest Flashlight</em></ins></span> app <span
class="removed"><del><strong>and dis-service spy on users even more than users
- expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <li id="M201312060">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not ask
about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
- <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a <span class="removed"><del><strong>movie</a>.
- </p>
-
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span
class="inserted"><ins><em>flashlight app send any information to
- anyone? A free software flashlight app would
not.</p></em></ins></span>
+ the reject-it-if-you-dislike-snooping “solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212100">
- <p>FTC says most mobile</em></ins></span> apps <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app and dis-service spy on users even more than
users
+ expected. It</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201307110">
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
</li>
- <li>
- <p>Facebook's app listens all the time,</strong></del></span>
+ <li><p>AI-powered driving apps can</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span>
+ Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1829,61 +1804,74 @@
<ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span>
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
<span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends</em></ins></span> it <span
class="removed"><del><strong>demands</strong></del></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+ tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>sends
it</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced</strong></del></span>
+ <p>Facebook's app listens all</strong></del></span>
<span class="inserted"><ins><em><li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with</em></ins></span> an <span
class="removed"><del><strong>opt-in proprietary search app that it
will</a>
- pre-install</strong></del></span> <span
class="inserted"><ins><em>update to the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running</em></ins></span> on <span
class="removed"><del><strong>some of</strong></del></span> its <span
class="removed"><del><strong>phones. The app will give Verizon the
same</strong></del></span> <span class="inserted"><ins><em>user's
computer</a>.</p>
+ program along with an update to</em></ins></span> the <span
class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to</em></ins></span> snoop on <span class="removed"><del><strong>what
people are listening to or watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
- information <span class="removed"><del><strong>about the users' searches
that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app is</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
- <li id="M201512290">
- <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201512290">
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>their users</em></ins></span> and <span
class="inserted"><ins><em>report to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of
spyware</strong></del></span>
+ video game consoles snoop on their users and report</em></ins></span> to
<span class="removed"><del><strong>personal data in</strong></del></span> the
<span class="removed"><del><strong>device</a>.
+ </p></strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console</em></ins></span> is
- <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>a
computer, and you can't trust a computer with
+ <p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
<span class="inserted"><ins><em><li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
- friends and associates</a>.</p>
+ collect a wide range</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
+ information</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> about <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>their users and their</em></ins></span> users' <span
class="removed"><del><strong>searches that Google normally gets
when</strong></del></span>
+ <span class="inserted"><ins><em>friends and associates</a>.</p>
+
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>data
+ collected by various cr…apps</em></ins></span> and <span
class="removed"><del><strong>the
+ user must explicitly opt-in before the app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
+ </li>
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user</strong></del></span> <span class="inserted"><ins><em>sites made by
different
companies.</p>
<p>They use this</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
@@ -1891,36 +1879,36 @@
<li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>manipulate people to
buy things, and hunt for
“whales” who</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
on many sorts</strong></del></span> <span class="inserted"><ins><em>be led
to spend a lot</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>money. They also
- use a back door to manipulate the game play for specific players.</p>
+ use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts,
it</strong></del></span> <span class="inserted"><ins><em>game play for specific
players.</p>
+
+ <p>While the article describes gratis games, games that cost
money</em></ins></span>
+ can
+ <span class="removed"><del><strong>alter them too</a>.
+ </p></li>
- <p>While the article describes gratis games, games that cost money
- can use</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>same tactics.</p>
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>use the same tactics.</p>
</li>
<li id="M201401280">
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>in server accounts,</strong></del></span> <span
class="inserted"><ins><em>the NSA takes advantage
- to spy through</em></ins></span> it <span class="removed"><del><strong>can
- alter them</strong></del></span> too</a>.
- <span class="removed"><del><strong></p></li>
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Here's information on</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
+ <p>This example illustrates how
“getting</strong></del></span> the <span
class="removed"><del><strong>user's consent”
for surveillance is inadequate as a protection against massive
surveillance.</p>
</li>
- <li><p>Google's new voice messaging</strong></del></span>
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
+ to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Apps</strong></del></span>
@@ -1955,13 +1943,16 @@
scans your mobile phone's photo collections for known faces</a>,
and suggests you</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>picture you take according to
who</strong></del></span> <span class="inserted"><ins><em>people that use
them</a>.</p>
+ to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
+ is in</strong></del></span> <span class="inserted"><ins><em>people that
use them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
- <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>article uses the
term <a
+ <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -1972,9 +1963,12 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>me and
-said, “Didn't I see you on television?” I said, “I
+<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
@@ -1982,24 +1976,20 @@
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>own words</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>the service.</p>
+ collect “whatever the TV sees,”</a> in</em></ins></span>
the <span class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span class="removed"><del><strong>service.</p>
</li>
- <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>third parties.
This</em></ins></span> is <span class="removed"><del><strong>based on
proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>in return for
- “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>snooping). In
August
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO,</em></ins></span> and <span class="removed"><del><strong>snooping).
In August
2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span> <span
class="inserted"><ins><em>slightly
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>this data is sold</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>third
parties. This is in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>some
+ are starting</strong></del></span> <span
class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>make
this spying acceptable, according</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>him,
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable, according to him,
is</em></ins></span> that it is <span
class="removed"><del><strong>nasty.</p>
<p>This article shows</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong><a
@@ -2100,25 +2090,25 @@
<p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to
determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys</strong></del></span>
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="inserted"><ins><em>Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
- </li>
-
- <li id="M201511060">
- <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
- manufacturers</em></ins></span> in <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>a child's speech, and even speak
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys</strong></del></span>
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="removed"><del><strong>a mobile phone. This would
+ enable crackers to listen in on a child's speech,</strong></del></span>
<span class="inserted"><ins><em>Web activity,</em></ins></span> and <span
class="removed"><del><strong>even speak
into the toys themselves.</p>
</li>
<li>
- <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>their users: their</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
+ </li>
+
+ <li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
@@ -2153,7 +2143,7 @@
what</em></ins></span> people <span class="removed"><del><strong>used
it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data
to</strong></del></span> <span class="inserted"><ins><em>are
watching</a>, even if it isn't</em></ins></span> a
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>are watching</a>, even if</em></ins></span> it
<span class="removed"><del><strong>had sold the data to</strong></del></span>
<span class="inserted"><ins><em>isn't</em></ins></span> a
<span class="removed"><del><strong>data broker, the data broker would
have been able to figure out
who the user was.</p>
@@ -2218,38 +2208,49 @@
<ul>
<li>
- <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>TV</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p></strong></del></span>
+ <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>TV</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p></em></ins></span>
+ snooping all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
<p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
- <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>get users' formal
+ <p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>back door, but</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
+ And what happens if a user declines consent? Probably the TV will
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say</em></ins></span> that <span
class="removed"><del><strong>could be a
- misunderstanding. However, it is certainly surveillance, at
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to report <span class="removed"><del><strong>its location to someone else and
to transmit
+ conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>what the
+ user watches—no exceptions!</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
+ <p>The article says</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> this <span
class="removed"><del><strong>is a back door, but</strong></del></span> <span
class="inserted"><ins><em>off has
+ no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em>the transmission reports</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding.
However,</strong></del></span> <span class="inserted"><ins><em>404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is certainly surveillance, at
least.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -2259,31 +2260,26 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>report what the
- user watches—no exceptions!</p>
- </li>
-
- <li id="M201405200">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>LG
“smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the switch to turn
this off has
- no effect</a>. (The fact</em></ins></span> that the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
- really
-<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
+<li><p></strong></del></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+
+ <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2297,10 +2293,8 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>means nothing;</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it can collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>stop this, but
any
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
@@ -2315,14 +2309,10 @@
</div>
<ul>
- <li><p>Spyware in Skype:</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
-
- <p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>way.</p>
<p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p></strong></del></span>
@@ -2403,10 +2393,11 @@
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511250"></em></ins></span>
- <p>The Nest Cam “smart” camera is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it
to outsmart
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches it “off.”</p>
+
+ <p>A “smart” <span class="removed"><del><strong>device
means the manufacturer is using it to outsmart
you.</p>
</li>
</ul>
@@ -2424,18 +2415,14 @@
<li><p>Spyware in many e-readers—not only the
Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span class="inserted"><ins><em><a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,</em></ins></span>
- even <span class="removed"><del><strong>which page</strong></del></span>
<span class="inserted"><ins><em>when</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ they report even which page the user reads at what
time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
-
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ needed</strong></del></span> <span class="inserted"><ins><em>device
means the manufacturer is using it</em></ins></span>
to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
</li>
</ul>
@@ -2497,10 +2484,10 @@
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>had sold the data</em></ins></span> to <span
class="inserted"><ins><em>a data
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
modem enables</strong></del></span>
<span class="inserted"><ins><em>user was.</p>
@@ -2560,14 +2547,14 @@
listen</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</em></ins></span> to <span
class="removed"><del><strong>everyone</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
- company based</em></ins></span> in the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ company based</em></ins></span> in the <span
class="removed"><del><strong>house, all the time</a>.</p>
<p>Today's technological practice does not include any way of
- making</strong></del></span> <span class="inserted"><ins><em>toys
with</em></ins></span> a <span class="removed"><del><strong>device that can
obey your voice commands without
- potentially spying</strong></del></span> <span
class="inserted"><ins><em>mobile phone. This would enable
+ making a device that</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>obey your voice commands without
+ potentially spying</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>you. Even if it is air-gapped, it could be
saving up records about you for later examination.</p>
</li>
@@ -2594,51 +2581,70 @@
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul>
<li>
<p>Vizio
“smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
+ report everything that</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>them, and not just broadcasts
and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable the surveillance, even if it were not hidden as it was in
+ computer,</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is.</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>.</em></ins></span>
The <span class="removed"><del><strong>existence</strong></del></span> <span
class="inserted"><ins><em>Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>a way to
+ disable</strong></del></span> the <span
class="removed"><del><strong>surveillance,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span
class="removed"><del><strong>if it were not hidden as it was in
these TVs, does not legitimize the surveillance.</p>
</li>
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>has access
to</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
+ <p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>saying “We won't
+ tell you how and where it's done”), users have no
way</em></ins></span>
+ to <span class="removed"><del><strong>get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>tracking, the TV will
+ And</strong></del></span> <span
class="inserted"><ins><em>know</em></ins></span> what happens <span
class="removed"><del><strong>if a user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
not work.”</p>
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-
-<ul class="blurbs">
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -3405,7 +3411,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/04/27 19:30:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary-surveillance.de.po 26 Apr 2019 12:00:38 -0000 1.283
+++ proprietary-surveillance.de.po 27 Apr 2019 19:30:04 -0000 1.284
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3969,6 +3969,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.419
retrieving revision 1.420
diff -u -b -r1.419 -r1.420
--- proprietary-surveillance.fr.po 26 Apr 2019 17:26:14 -0000 1.419
+++ proprietary-surveillance.fr.po 27 Apr 2019 19:30:04 -0000 1.420
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-04-26 19:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3370,6 +3371,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-surveillance.it-diff.html 26 Apr 2019 12:00:38 -0000
1.135
+++ proprietary-surveillance.it-diff.html 27 Apr 2019 19:30:04 -0000
1.136
@@ -1272,42 +1272,72 @@
78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit <span class="inserted"><ins><em>the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech,</strong></del></span>
<span class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li>
+ <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was</em></ins></span> in <span
class="inserted"><ins><em>no hurry to take action. This proves
- that</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
+ <p>Many nonfree apps</em></ins></span> have
+ <span class="removed"><del><strong>checked and changed.</p>
+
+ <p>The company that made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in
interacting</em></ins></span> with <span class="inserted"><ins><em>the
app.</p>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
+ data broker, the data broker would have been able</strong></del></span>
+ <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ them</em></ins></span> to <span class="removed"><del><strong>figure out
+ who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
+ the user <span class="removed"><del><strong>was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total</strong></del></span> <span
class="inserted"><ins><em>interface</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
@@ -1315,10 +1345,10 @@
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
@@ -1956,16 +1986,18 @@
across devices.</p>
<p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ is an injustice already.</p></em></ins></span>
</li>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>microphones</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
</li>
@@ -1973,49 +2005,36 @@
<li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
- record</a>.</p></em></ins></span>
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
- users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>US or some
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it</em></ins></span> to the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>was surrounded</strong></del></span>
<span class="inserted"><ins><em>is done</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free
- software <span class="removed"><del><strong>which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
@@ -2023,59 +2042,49 @@
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report</em></ins></span> was <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
- consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>TV
will not
work.”</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to
<span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
- user <span class="removed"><del><strong>was.</p>
+ <p>Proper laws would say that TVs are not allowed to report
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>watches—no
exceptions!</p></em></ins></span>
+ <p>That</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen to these conversations
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>these conversations
was unacceptable by itself.</p></li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -2092,22 +2101,29 @@
<ul>
<li><p>
<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact</em></ins></span> that the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
- really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>means nothing; the server could save that data
anyway.)</p>
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>other
devices</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+
+ <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>patch to
stop this, but any
+ product could spy this way.</p>
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2121,24 +2137,13 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>other devices on the user's local
network</a>.</p>
-
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>can collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>had installed
a patch to stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>way.</p>
-
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
- </li>
-
- <li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching
TV.</p></em></ins></span>
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
</li>
</ul>
@@ -2212,8 +2217,10 @@
<li id="M201511250"></em></ins></span>
<p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>, <span class="removed"><del><strong>even when the
“owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
to outsmart
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches it “off.”</p>
+
+ <p>A “smart” device means the manufacturer is using it
<span class="removed"><del><strong>to outsmart
you.</p>
</li>
</ul>
@@ -2231,34 +2238,37 @@
<li><p>Spyware in many e-readers—not only the
Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
- <span class="inserted"><ins><em>even when</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ they report even which page the user reads at what
time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
-
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
+ needed to check DRM!</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
+<ul>
<li><p>Computerized cars with nonfree software are
<a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li></strong></del></span>
+ snooping devices</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>to outsmart
you.</p></em></ins></span>
+ </li>
+<span class="inserted"><ins><em></ul>
-<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul class="blurbs"></em></ins></span>
<li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
<p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
@@ -2305,16 +2315,15 @@
<p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>data
to a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>data broker would
have been able</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span>
<span class="inserted"><ins><em>user was.</p>
<p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
+ the <span class="removed"><del><strong>time; it is
possible</strong></del></span> <span class="inserted"><ins><em>company has been
ordered to pay a total of C$4m</a></em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
though.</p></strong></del></span> <span class="inserted"><ins><em>its
customers.</p></em></ins></span>
</li>
@@ -2334,111 +2343,125 @@
payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
- <li><p>Tesla cars allow the company to extract data remotely and
- determine</strong></del></span>
+ <li><p>Tesla cars allow</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data
- and hand it over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p></em></ins></span>
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ conversations was unacceptable by itself.</p>
+ </li>
+
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
+ company <span class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span>
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ </li>
+</ul></em></ins></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
<ul>
<li><p>Nest thermometers
- send</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p></em></ins></span>
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+ <li id="M201904240">
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul>
<li>
<p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>them, and not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>Alexa service are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and <span class="removed"><del><strong>not just
broadcasts</strong></del></span> <span class="inserted"><ins><em>Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>other personal data</a>.</p>
+
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>nonfree,
and data processing is done
+ “<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
+ the <span class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing
way</em></ins></span> of <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
+ tell you how and where it's done”), users have no</em></ins></span>
way
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>know what happens to</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it</strong></del></span>
<span class="inserted"><ins><em>recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-
-<ul class="blurbs">
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>still
- paying for</em></ins></span> the <span class="removed"><del><strong>user's
own
- computer,</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
- paid for.</p>
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>not hidden
as</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span
class="removed"><del><strong>is. The existence</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="inserted"><ins><em>ink cartridges that would otherwise be in
- working order.</p>
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+ restrictions</em></ins></span> in
+ <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ working order.</p></em></ins></span>
</li>
- <li id="M201808120">
- <p>Crackers found</em></ins></span> a way to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
- </li>
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon
device,
+ <span class="inserted"><ins><em><li id="M201808120">
+ <p>Crackers found a way to break the security of an Amazon device,
and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -3142,7 +3165,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/04/27 19:30:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary-surveillance.it.po 26 Apr 2019 12:00:39 -0000 1.296
+++ proprietary-surveillance.it.po 27 Apr 2019 19:30:04 -0000 1.297
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3756,6 +3756,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-surveillance.ja-diff.html 26 Apr 2019 12:00:39 -0000
1.145
+++ proprietary-surveillance.ja-diff.html 27 Apr 2019 19:30:04 -0000
1.146
@@ -2406,6 +2406,25 @@
</div>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -3013,7 +3032,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:39 $
+$Date: 2019/04/27 19:30:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary-surveillance.ja.po 26 Apr 2019 12:00:39 -0000 1.269
+++ proprietary-surveillance.ja.po 27 Apr 2019 19:30:04 -0000 1.270
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3167,6 +3167,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.pot 26 Apr 2019 12:00:48 -0000 1.217
+++ proprietary-surveillance.pot 27 Apr 2019 19:30:04 -0000 1.218
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2299,6 +2299,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a "
+"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
+"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
+"assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a "
+"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\">
"
+"location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
+"cloud</a>” (a soothing way of saying “We won't tell you how and "
+"where it's done”), users have no way to know what happens to the "
+"recordings unless human eavesdroppers <a "
+"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\">
"
+"break their non-disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.514
retrieving revision 1.515
diff -u -b -r1.514 -r1.515
--- proprietary-surveillance.ru.po 26 Apr 2019 12:32:44 -0000 1.514
+++ proprietary-surveillance.ru.po 27 Apr 2019 19:30:04 -0000 1.515
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3329,6 +3330,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary.de-diff.html 26 Apr 2019 12:00:49 -0000 1.88
+++ proprietary.de-diff.html 27 Apr 2019 19:30:04 -0000 1.89
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
@@ -125,10 +125,10 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -185,6 +185,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
@@ -254,15 +273,6 @@
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
- </li>
</ul></em></ins></span>
@@ -323,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.de.po 26 Apr 2019 12:00:49 -0000 1.130
+++ proprietary.de.po 27 Apr 2019 19:30:04 -0000 1.131
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -542,19 +568,6 @@
"prison\"> sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary.es.po 27 Apr 2019 11:54:55 -0000 1.156
+++ proprietary.es.po 27 Apr 2019 19:30:04 -0000 1.157
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -437,24 +464,6 @@
"theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-"
"years-in-prison\">encausados por este fraude</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google rastrea los movimientos de los teléfonos Android, y a veces <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\">guarda los datos durante años</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Un software privativo presente en el teléfono debe de ser el responsable de "
-"enviar los datos de localización a Google."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -534,6 +543,22 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google rastrea los movimientos de los teléfonos Android, y a veces <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\">guarda los datos durante años</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Un software privativo presente en el teléfono debe de ser el responsable "
+#~ "de enviar los datos de localización a Google."
+
+#~ msgid ""
#~ "An Android phone was observed to track location even while in airplane "
#~ "mode. It didn't send the location data while in airplane mode. Instead, "
#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.fr.po 26 Apr 2019 17:26:15 -0000 1.194
+++ proprietary.fr.po 27 Apr 2019 19:30:04 -0000 1.195
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-04-26 19:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -435,24 +462,6 @@
"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
"prison\">poursuivis pour cette fraude</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/"
-"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
-"les données, parfois pendant des années</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Ce doit être un logiciel non libre présent dans le téléphone qui envoie
ces "
-"données à Google."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -526,3 +535,19 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google piste les téléphones Android et <a
href=\"https://www.nytimes.com/"
+#~ "interactive/2019/04/13/us/google-location-tracking-police.html"
+#~ "\">sauvegarde les données, parfois pendant des années</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Ce doit être un logiciel non libre présent dans le téléphone qui
envoie "
+#~ "ces données à Google."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.it-diff.html 26 Apr 2019 12:00:49 -0000 1.100
+++ proprietary.it-diff.html 27 Apr 2019 19:30:04 -0000 1.101
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
@@ -184,6 +184,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
@@ -253,15 +272,6 @@
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
- </li>
</ul></em></ins></span>
@@ -322,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.it.po 26 Apr 2019 12:00:49 -0000 1.139
+++ proprietary.it.po 27 Apr 2019 19:30:05 -0000 1.140
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -519,19 +545,6 @@
"prison\"> sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary.ja-diff.html 26 Apr 2019 12:00:49 -0000 1.101
+++ proprietary.ja-diff.html 27 Apr 2019 19:30:05 -0000 1.102
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -181,6 +181,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
@@ -250,15 +269,6 @@
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
- </li>
</ul></em></ins></span>
@@ -319,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.ja.po 26 Apr 2019 12:00:49 -0000 1.122
+++ proprietary.ja.po 27 Apr 2019 19:30:05 -0000 1.123
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -452,19 +478,6 @@
"prison\"> sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.nl-diff.html 26 Apr 2019 12:00:49 -0000 1.100
+++ proprietary.nl-diff.html 27 Apr 2019 19:30:05 -0000 1.101
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,18 +101,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -184,6 +184,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
@@ -253,15 +272,6 @@
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
- </li>
</ul></em></ins></span>
@@ -322,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.nl.po 26 Apr 2019 12:00:49 -0000 1.111
+++ proprietary.nl.po 27 Apr 2019 19:30:05 -0000 1.112
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -512,19 +538,6 @@
"prison\"> sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary.pl-diff.html 26 Apr 2019 12:00:49 -0000 1.118
+++ proprietary.pl-diff.html 27 Apr 2019 19:30:05 -0000 1.119
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
-instances of malicious functionalities (with more than 450 references to
+<p>As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -132,11 +132,11 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
@@ -251,15 +270,6 @@
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
- </li>
</ul></em></ins></span>
@@ -320,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.pl.po 26 Apr 2019 12:00:49 -0000 1.106
+++ proprietary.pl.po 27 Apr 2019 19:30:05 -0000 1.107
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -594,19 +620,6 @@
"prison\"> sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.pot 26 Apr 2019 12:00:49 -0000 1.103
+++ proprietary.pot 27 Apr 2019 19:30:05 -0000 1.104
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a "
+"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
+"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
+"assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a "
+"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\">
"
+"location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
+"cloud</a>” (a soothing way of saying “We won't tell you how and "
+"where it's done”), users have no way to know what happens to the "
+"recordings unless human eavesdroppers <a "
+"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\">
"
+"break their non-disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a "
"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk\">no
"
"longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
@@ -329,19 +355,6 @@
"sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a "
-"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
-"saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary.pt-br.po 26 Apr 2019 13:28:45 -0000 1.153
+++ proprietary.pt-br.po 27 Apr 2019 19:30:05 -0000 1.154
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-04-26 10:08-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -428,24 +455,6 @@
"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
"prison\"> processados por esta fraude</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"O Google acompanha os movimentos de telefones Android e, Ã s vezes, <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> salva os dados de anos</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Software não livre no telefone tem que ser responsável por enviar os dados "
-"de localização para o Google."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -521,6 +530,22 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "O Google acompanha os movimentos de telefones Android e, Ã s vezes, <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> salva os dados de anos</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Software não livre no telefone tem que ser responsável por enviar os "
+#~ "dados de localização para o Google."
+
+#~ msgid ""
#~ "This has harmful implications for women's rights to equal employment and "
#~ "freedom to make their own pregnancy choices. Don't use these apps, even "
#~ "if someone offers you a reward to do so."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.ru.po 26 Apr 2019 12:32:44 -0000 1.230
+++ proprietary.ru.po 27 Apr 2019 19:30:05 -0000 1.231
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -437,23 +464,6 @@
"business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"
"\"> оÑдали под ÑÑд за ÑÑо моÑенниÑеÑÑво</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов на
базе Android, и иногда <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑи даннÑе годами</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Ðа оÑÑÑÐ»ÐºÑ Ð´Ð°Ð½Ð½ÑÑ
в Google в ÑелеÑоне должнÑ
оÑвеÑаÑÑ Ð½ÐµÑвободнÑе пÑогÑаммÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -533,6 +543,22 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов
на базе Android, и иногда <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑи даннÑе годами</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Ðа оÑÑÑÐ»ÐºÑ Ð´Ð°Ð½Ð½ÑÑ
в Google в ÑелеÑоне
Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾ÑвеÑаÑÑ Ð½ÐµÑвободнÑе "
+#~ "пÑогÑаммÑ."
+
+#~ msgid ""
#~ "This has harmful implications for women's rights to equal employment and "
#~ "freedom to make their own pregnancy choices. Don't use these apps, even "
#~ "if someone offers you a reward to do so."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.zh-tw-diff.html 26 Apr 2019 12:00:49 -0000 1.78
+++ proprietary.zh-tw-diff.html 27 Apr 2019 19:30:05 -0000 1.79
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
@@ -125,10 +125,10 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -185,6 +185,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
+
+ <p>Since the client program is nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
+ </li>
+
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk">no
@@ -254,15 +273,6 @@
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
- </li>
</ul></em></ins></span>
@@ -323,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.zh-tw.po 26 Apr 2019 12:00:49 -0000 1.89
+++ proprietary.zh-tw.po 27 Apr 2019 19:30:05 -0000 1.90
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -428,19 +454,6 @@
"prison\"> sued over this fraud</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- pt-br.po 26 Apr 2019 13:28:45 -0000 1.103
+++ pt-br.po 27 Apr 2019 19:30:05 -0000 1.104
@@ -334,6 +334,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- ru.po 26 Apr 2019 12:25:26 -0000 1.172
+++ ru.po 27 Apr 2019 19:30:05 -0000 1.173
@@ -432,6 +432,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
@@ -6172,16 +6198,15 @@
"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
"app-podcast\"> a new one is being developed</a>."
msgstr ""
-"ÐÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº вÑеднÑм поÑледÑÑвиÑм длÑ
пÑав женÑин на ÑавнÑе ÑÑÐ»Ð¾Ð²Ð¸Ñ "
-"ÑÑÑда и ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿ÑинимаÑÑ ÑеÑÐµÐ½Ð¸Ñ Ð¾
ÑобÑÑвенной беÑеманноÑÑи. Ðе "
+"ÐÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº вÑеднÑм поÑледÑÑвиÑм длÑ
пÑав женÑин на ÑавнÑе ÑÑÐ»Ð¾Ð²Ð¸Ñ ÑÑÑда "
+"и ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿ÑинимаÑÑ ÑеÑÐµÐ½Ð¸Ñ Ð¾ ÑобÑÑвенной
беÑеманноÑÑи. Ðе полÑзÑйÑеÑÑ ÑÑими "
+"пÑиложениÑми, даже еÑли кÑо-Ñо пÑедлагаеÑ
вам за ÑÑо вознагÑаждение. Ðе "
"полÑзÑйÑеÑÑ ÑÑими пÑиложениÑми, даже еÑли
кÑо-Ñо пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼ за ÑÑо "
-"вознагÑаждение. Ðе полÑзÑйÑеÑÑ ÑÑими "
-"пÑиложениÑми, даже еÑли кÑо-Ñо пÑедлагаеÑ
вам за ÑÑо вознагÑаждение. "
-"Свободное пÑиложение, коÑоÑое вÑполнÑеÑ
более или менее ÑÑ Ð¶Ðµ ÑабоÑÑ, не "
-"ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð° вами, можно полÑÑиÑÑ Ð½Ð° <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, и <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> ÑазÑабаÑÑваеÑÑÑ Ð½Ð¾Ð²Ð°Ñ
пÑогÑамма</a>."
+"вознагÑаждение. Свободное пÑиложение,
коÑоÑое вÑполнÑÐµÑ Ð±Ð¾Ð»ÐµÐµ или менее ÑÑ "
+"же ÑабоÑÑ, не ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð° вами, можно
полÑÑиÑÑ Ð½Ð° <a href=\"https://search.f-"
+"droid.org/?q=menstr\">F-Droid</a>, и <a href=\"https://www.bloomberg.com/"
+"news/audio/2019-04-10/building-a-better-period-tracking-app-podcast\"> "
+"ÑазÑабаÑÑваеÑÑÑ Ð½Ð¾Ð²Ð°Ñ Ð¿ÑогÑамма</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- zh-tw.po 26 Apr 2019 12:00:49 -0000 1.79
+++ zh-tw.po 27 Apr 2019 19:30:05 -0000 1.80
@@ -334,6 +334,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://"
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done “<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>” (a soothing way of saying “We won't tell you how and where "
+"it's done”), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., (continued)
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/18
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/18
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/26
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=