[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Wed, 8 May 2019 08:31:47 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/05/08 08:31:45
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.423&r2=1.424
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.517&r2=1.518
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.81&r2=1.82
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- de.po 27 Apr 2019 20:00:24 -0000 1.81
+++ de.po 8 May 2019 12:31:39 -0000 1.82
@@ -4111,6 +4111,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- es.po 1 May 2019 08:59:54 -0000 1.108
+++ es.po 8 May 2019 12:31:41 -0000 1.109
@@ -2924,6 +2924,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- fr.po 28 Apr 2019 13:35:40 -0000 1.142
+++ fr.po 8 May 2019 12:31:41 -0000 1.143
@@ -3262,6 +3262,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- it.po 27 Apr 2019 20:00:24 -0000 1.81
+++ it.po 8 May 2019 12:31:42 -0000 1.82
@@ -3831,6 +3831,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- ja.po 27 Apr 2019 20:00:24 -0000 1.81
+++ ja.po 8 May 2019 12:31:42 -0000 1.82
@@ -3302,6 +3302,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-cars.de-diff.html 20 Apr 2019 16:30:39 -0000 1.29
+++ malware-cars.de-diff.html 8 May 2019 12:31:42 -0000 1.30
@@ -87,6 +87,19 @@
them</a>.</p>
</li>
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
@@ -172,22 +185,22 @@
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
tests</a>: to activate a special low-emission gearshifting mode until
- the first time the car made a <span class="removed"><del><strong>turn.
-</li>
+ the first time the car made a <span
class="removed"><del><strong>turn.</strong></del></span> <span
class="inserted"><ins><em>turn.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>Caterpillar vehicles come with a <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
-back-door to shutoff the engine</a>
remotely.</p></strong></del></span> <span
class="inserted"><ins><em>turn.</p></em></ins></span>
- </li>
+back-door</strong></del></span>
-<span class="removed"><del><strong><li>
+ <span class="inserted"><ins><em><li id="M201608110">
+ <p>Due</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a> remotely.</p>
+</li>
+
+<li>
<p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
-Volkswagen programmed its car engine computers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608110">
- <p>Due</em></ins></span> to <span
class="removed"><del><strong>detect the
+Volkswagen programmed its car engine computers to detect the
Environmental Protection Agency's emission tests</a>,
and run dirty</strong></del></span> <span class="inserted"><ins><em>weak
security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
@@ -392,7 +405,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/20 16:30:39 $
+$Date: 2019/05/08 12:31:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-cars.de.po 20 Apr 2019 16:30:39 -0000 1.19
+++ malware-cars.de.po 8 May 2019 12:31:42 -0000 1.20
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -165,6 +165,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-cars.fr.po 20 Apr 2019 18:03:19 -0000 1.30
+++ malware-cars.fr.po 8 May 2019 12:31:42 -0000 1.31
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-04-20 20:02+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -128,6 +129,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-cars.pot 20 Apr 2019 16:30:39 -0000 1.14
+++ malware-cars.pot 8 May 2019 12:31:42 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -94,6 +94,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a "
+"href=\"https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\">
"
+"near-complete access to the internal car network</a>. It is constantly "
+"connected to the cellular phone network and sends Ford a lot of data, "
+"including car location. This feature operates even when the ignition key is "
+"removed, and users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a "
"href=\"https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html\"> "
"offer the feature of a universal back door</a>."
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- malware-cars.ru.po 22 Apr 2019 08:59:53 -0000 1.36
+++ malware-cars.ru.po 8 May 2019 12:31:42 -0000 1.37
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-09-27 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -128,6 +129,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- nl.po 27 Apr 2019 20:00:24 -0000 1.81
+++ nl.po 8 May 2019 12:31:42 -0000 1.82
@@ -2765,6 +2765,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- pl.po 27 Apr 2019 20:00:24 -0000 1.81
+++ pl.po 8 May 2019 12:31:42 -0000 1.82
@@ -2332,6 +2332,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- pot 27 Apr 2019 20:00:24 -0000 1.81
+++ pot 8 May 2019 12:31:42 -0000 1.82
@@ -2187,6 +2187,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-back-doors.de-diff.html 13 Apr 2019 13:01:44 -0000 1.24
+++ proprietary-back-doors.de-diff.html 8 May 2019 12:31:42 -0000 1.25
@@ -169,43 +169,46 @@
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
takes control</strong></del></span> <span
class="inserted"><ins><em>changing settings in a
dlink</em></ins></span> of <span class="removed"><del><strong>user
interface items after luring the user into
- entering</strong></del></span> an <span
class="removed"><del><strong>admin password</a>.</p>
- </li>
-
- <li>
- <p>Users reported that <a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
- <p>Microsoft was in fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching
on</strong></del></span> <span class="inserted"><ins><em>eye.</p>
+ entering</strong></del></span> an <span
class="removed"><del><strong>admin
password</a>.</p></strong></del></span> <span
class="inserted"><ins><em>eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router has</em></ins></span> a <span class="removed"><del><strong>flag
- that said whether to “upgrade” to Windows 10 when
users</strong></del></span> <span class="inserted"><ins><em>back
door</a>.</p>
+ router has a back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
- routers have back doors</a>.</p>
+ routers have back doors</a>.</p></em></ins></span>
</li>
- <li id="M201511244">
- <p>Google has long</em></ins></span> had <span
class="removed"><del><strong>turned it off.</p>
- <p>Later on, Microsoft published instructions
on</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows
10</a>.</p>
- <p>This seems to involve use of a</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a</em></ins></span>
- back door <span class="removed"><del><strong>in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>to remotely
unlock an Android device</a>, unless its disk
+ <span class="removed"><del><strong><li>
+ <p>Users reported that</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511244">
+ <p>Google has long had</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door</em></ins></span> to <span class="removed"><del><strong>replace
Windows 7 and 8</strong></del></span> <span class="inserted"><ins><em>remotely
unlock an Android device</a>, unless its disk
is encrypted (possible since Android 5.0 Lollipop, but still not
- quite the default).</p></em></ins></span>
+ quite the default).</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <li id="M201511194">
+ <p>Caterpillar vehicles come</em></ins></span> with <span
class="removed"><del><strong>all-spying
+ Windows 10</a>.</p>
+ <p>Microsoft was in fact</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a
flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows
10</a>.</p>
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201511194"></em></ins></span>
+ <li>
<p>Caterpillar vehicles come with <a
-
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"></em></ins></span>
a back door to shutoff the engine</a> remotely.</p>
</li>
@@ -346,13 +349,17 @@
<p>It is used by 14,000 Android applications.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>In Android,</strong></del></span>
<span class="inserted"><ins><em><li id="M201112080">
- <p> In addition to its <a href="#windows-update">universal back
- door</a>, Windows 8 has a back door for <a
-
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely deleting apps</a>.</p>
+ <p> In addition to its</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
+ door</a>, Windows 8</em></ins></span> has a back door <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>for <a
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+ remotely <span class="removed"><del><strong>delete apps.</a> (It
was in a
+ program called GTalkService, which seems since
then</strong></del></span> <span class="inserted"><ins><em>deleting
apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
@@ -361,12 +368,11 @@
way.</p>
</li>
- <li id="M201103070"></em></ins></span>
+ <li id="M201103070">
<p>In Android, <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
- Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It was in a
- program called GTalkService, which seems since then to have been
+
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps</a>. (It was in a
+ program called GTalkService, which seems since then</em></ins></span> to
have been
merged into Google Play.)</p>
<p>Google can also <a
@@ -410,16 +416,29 @@
<span class="removed"><del><strong><ul>
<li>
- <p>ChromeOS has</strong></del></span>
+ <p>ChromeOS</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="inserted"><ins><em><a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford</em></ins></span> a
<span class="removed"><del><strong>universal back door. At least, Google says
+ it does—in</strong></del></span> <span
class="inserted"><ins><em>lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of</em></ins></span> a universal back <span
class="removed"><del><strong>door. At least, Google says
- it does—in <a
- href="https://www.google.com/intl/en/chromebook/termsofservice.html">
- section 4 of</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
+ <p>New GM cars</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.google.com/intl/en/chromebook/termsofservice.html">
+ section 4</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature</em></ins></span> of <span class="inserted"><ins><em>a
universal back door</a>.</p>
<p>Every nonfree program offers</em></ins></span> the <span
class="removed"><del><strong>EULA</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user zero security against its
developer. With this malfeature, GM has explicitly made things even
@@ -759,7 +778,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 12:31:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary-back-doors.de.po 13 Apr 2019 13:01:44 -0000 1.123
+++ proprietary-back-doors.de.po 8 May 2019 12:31:42 -0000 1.124
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -702,6 +702,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-back-doors.es.po 18 Apr 2019 10:29:55 -0000 1.6
+++ proprietary-back-doors.es.po 8 May 2019 12:31:42 -0000 1.7
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-04-18 12:11+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -588,6 +589,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary-back-doors.fr.po 13 Apr 2019 14:12:54 -0000 1.126
+++ proprietary-back-doors.fr.po 8 May 2019 12:31:42 -0000 1.127
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-04-13 16:11+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -596,6 +597,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-back-doors.it-diff.html 13 Apr 2019 13:01:44 -0000 1.51
+++ proprietary-back-doors.it-diff.html 8 May 2019 12:31:42 -0000 1.52
@@ -478,7 +478,7 @@
which could also be used maliciously. You might well
decide</em></ins></span> to
<span class="inserted"><ins><em>let a security service remotely
<em>deactivate</em> programs that
it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should</em></ins></span>
have <span class="removed"><del><strong>been merged</strong></del></span> <span
class="inserted"><ins><em>the right to decide
+ <em>delete</em> the programs, and you should</em></ins></span>
have <span class="removed"><del><strong>been merged into Google
Play).</strong></del></span> <span class="inserted"><ins><em>the right to decide
who (if anyone) to trust in this way.</p>
</li>
@@ -495,6 +495,19 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location.</em></ins></span> This <span
class="inserted"><ins><em>feature operates even when the ignition
+ key</em></ins></span> is <span class="inserted"><ins><em>removed, and
users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
@@ -509,9 +522,8 @@
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert
it</em></ins></span>
- into <span class="removed"><del><strong>Google Play).
-This is</strong></del></span> <span class="inserted"><ins><em>one.</p>
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
</li>
<li id="M201711010">
@@ -531,7 +543,7 @@
<p>While remotely allowing car “owners” to use the
whole battery capacity did</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>do them any harm, the same back
door would permit Tesla (perhaps under the command of some
- government) to remotely order the car to use none of its battery. Or
+ government)</em></ins></span> to <span class="inserted"><ins><em>remotely
order the car to use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
@@ -577,7 +589,7 @@
it installs “updates” automatically</a>.</p>
<p>We have found nothing explicitly documenting the lack of any way
- to disable remote changes</em></ins></span> to <span
class="inserted"><ins><em>the software, so we are not completely
+ to disable remote changes to the software, so we are not completely
sure there isn't one, but this seems pretty clear.</p>
</li>
@@ -830,7 +842,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 12:31:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-back-doors.it.po 13 Apr 2019 13:01:44 -0000 1.116
+++ proprietary-back-doors.it.po 8 May 2019 12:31:42 -0000 1.117
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -719,6 +719,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-back-doors.ja-diff.html 13 Apr 2019 13:01:44 -0000 1.47
+++ proprietary-back-doors.ja-diff.html 8 May 2019 12:31:42 -0000 1.48
@@ -314,7 +314,7 @@
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word to refer</em></ins></span> to <span
class="inserted"><ins><em>sharing copies is a smear;
+ attacking ships. Using that word</em></ins></span> to <span
class="inserted"><ins><em>refer to sharing copies is a smear;
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
@@ -369,37 +369,38 @@
remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em></em></ins></span>
the <span class="removed"><del><strong>modem chip. So
why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>programs, and you
- should have the right</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because</strong></del></span>
<span class="inserted"><ins><em>decide whom (if anyone) to trust
in</em></ins></span> this <span class="removed"><del><strong>one is controlled
-by Coolpad.
-</p></strong></del></span>
- <span class="inserted"><ins><em>way.</p></em></ins></span>
+ should have the right</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because</strong></del></span>
<span class="inserted"><ins><em>decide whom (if anyone) to trust
in</em></ins></span> this <span
class="removed"><del><strong>one</strong></del></span>
+ <span class="inserted"><ins><em>way.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Microsoft Windows</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201103070">
+ <li id="M201103070">
<p>In Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>to remotely delete apps</a>. (It was in a
- program called GTalkService,</em></ins></span> which
-<span class="removed"><del><strong><a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever</strong></del></span> <span
class="inserted"><ins><em>seems since then to have been
+ Google has a back door to remotely delete apps</a>. (It was in a
+ program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
- <p>Google</em></ins></span> can <span
class="removed"><del><strong>be imposed on the users</a>.
+ <p>Google can also <a
+
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through GTalkService.
This</em></ins></span> is <span class="removed"><del><strong>controlled
+by Coolpad.
</p>
-<p>More information on when</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
+</li>
+
+<li>
+<p>Microsoft Windows has</strong></del></span>
+ <span class="inserted"><ins><em>not equivalent to</em></ins></span> a
universal back <span class="removed"><del><strong>door through which
+<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on the users</a>.
</p>
-<p>In Windows 10, the</strong></del></span>
- <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService. This is
- not equivalent to a</em></ins></span> universal back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+<p>More information on when
+<a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"></strong></del></span>
<span class="inserted"><ins><em>door, but permits various dirty
tricks.</p>
- <p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
+ <p>Although Google's <em>exercise</em>
of</em></ins></span> this <span class="removed"><del><strong>was used</a>.
+</p>
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>power has not been
+ malicious so far,</em></ins></span> the <span
class="removed"><del><strong>universal back door</strong></del></span> <span
class="inserted"><ins><em>point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
“upgrades” will</strong></del></span> <span
class="inserted"><ins><em>that nobody should have such power,
which could also</em></ins></span> be <span
class="removed"><del><strong><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
and immediately imposed</a>.
@@ -428,34 +429,44 @@
</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>The iPhone has</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em></ul>
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for
-<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ <li id="M201902011"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>a back door
for</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling
it without understanding.
</p>
</li>
<li>
- <p>Apple can, and regularly does,
+ <p>Apple can,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network</em></ins></span> and <span
class="removed"><del><strong>regularly does,
<a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
-
- <p>Every nonfree program offers</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ including car location. This feature operates even when</em></ins></span>
the <span class="removed"><del><strong>state</a>.
</p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8</strong></del></span> <span class="inserted"><ins><em>user
zero</em></ins></span> security <span
class="removed"><del><strong>improvements</a>; but</strong></del></span>
<span class="inserted"><ins><em>against its
+ <p>This may</strong></del></span> <span
class="inserted"><ins><em>ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>improved with</strong></del></span> <span
class="inserted"><ins><em>you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
+ <li id="M201812300">
+ <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature of a universal back door</a>.</p>
+
+ <p>Every nonfree program offers the user zero</em></ins></span>
security <span class="removed"><del><strong>improvements</a>;
but</strong></del></span> <span class="inserted"><ins><em>against its
developer. With this malfeature, GM has explicitly made things even
worse.</p>
</li>
@@ -814,7 +825,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 12:31:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary-back-doors.ja.po 13 Apr 2019 13:01:44 -0000 1.95
+++ proprietary-back-doors.ja.po 8 May 2019 12:31:42 -0000 1.96
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -589,6 +589,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary-back-doors.pot 13 Apr 2019 13:01:44 -0000 1.65
+++ proprietary-back-doors.pot 8 May 2019 12:31:42 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -409,6 +409,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a "
+"href=\"https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\">
"
+"near-complete access to the internal car network</a>. It is constantly "
+"connected to the cellular phone network and sends Ford a lot of data, "
+"including car location. This feature operates even when the ignition key is "
+"removed, and users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a "
"href=\"https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html\"> "
"offer the feature of a universal back door</a>."
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary-back-doors.ru.po 13 Apr 2019 14:59:56 -0000 1.172
+++ proprietary-back-doors.ru.po 8 May 2019 12:31:42 -0000 1.173
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -581,6 +582,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-surveillance.de-diff.html 27 Apr 2019 20:00:24 -0000
1.70
+++ proprietary-surveillance.de-diff.html 8 May 2019 12:31:42 -0000
1.71
@@ -1155,11 +1155,11 @@
</li>
<li id="M201803050">
- <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>dis-service
+ <p>The moviepass app and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>read logs
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>after
going</em></ins></span> to <span class="removed"><del><strong>read logs
for other</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
@@ -1208,14 +1208,14 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>non-premium version</strong></del></span>
<span class="inserted"><ins><em>responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google</em></ins></span> have
- <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+ <p>Could Google have done a better job</em></ins></span> of <span
class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
@@ -1253,13 +1253,15 @@
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
- </li>
+ <p>With proprietary apps, one can only hope that <span
class="removed"><del><strong>they don't.</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li>
+ <p>A study found 234 Android apps</strong></del></span> <span
class="inserted"><ins><em>they don't.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
- <p>A study found 234 Android apps that <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>track users by <a
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
@@ -1279,7 +1281,7 @@
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that</em></ins></span> users <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>gave consent for this,
+ If the fine print of the app said</em></ins></span> that <span
class="removed"><del><strong>track</strong></del></span> users <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>gave consent for this,
would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from
beacons placed in stores or played by TV programs</a>.
</p></strong></del></span> <span class="inserted"><ins><em>design
@@ -1296,130 +1298,129 @@
</li>
<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+<p>Google Play intentionally sends</strong></del></span>
<span class="inserted"><ins><em><li id="M201703300">
- <p>Verizon</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>it will</a> pre-install
- on some</em></ins></span> of <span class="removed"><del><strong>users is
not enough
-to legitimize actions like this. At this point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>its
phones. The app will give Verizon</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>same
information
- about the users' searches</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to.</strong></del></span> Google <span
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
+ <p>Verizon <a
+
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>only one
phone</a>,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in</strong></del></span> the
<span class="removed"><del><strong>first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>user must
+ <p>Currently, the app is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</em></ins></span> the
<span class="removed"><del><strong>personal details</strong></del></span> <span
class="inserted"><ins><em>user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>spyware is
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
<li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ movements before and after the ride</a>.</p>
- <p>This</em></ins></span> example <span
class="removed"><del><strong>of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how
“getting</em></ins></span> the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>user's
- consent” for surveillance is inadequate as</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>protection against
- massive surveillance.</p></em></ins></span>
+ <p>This example illustrates how “getting the user's
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160">
+ <li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>most popular</strong></del></span> <span
class="inserted"><ins><em>privacy and security of
- 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps
- <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>concluded
that “in spite of the promises
- for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>anonymity given by the majority of VPN
- apps—millions</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third parties.</p>
- </li>
+ research paper</a></em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em>investigated</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>may be
unawarely subject</em></ins></span> to <span class="inserted"><ins><em>poor
security
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from</em></ins></span>
the <span class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>research paper,
- of some proprietary VPN</em></ins></span> apps <span
class="inserted"><ins><em>that track users and infringe their
+ <p>Following is a non-exhaustive list, taken from</em></ins></span>
the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>research paper,</em></ins></span>
+ of <span class="inserted"><ins><em>some proprietary VPN apps that
track</em></ins></span> users <span class="removed"><del><strong>is not
enough</strong></del></span> <span class="inserted"><ins><em>and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such</em></ins></span> as
- <span class="removed"><del><strong>“free”—they are not
free software. The clear way</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> users <span
class="removed"><del><strong>have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to. Google should
clearly</strong></del></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span> <span class="inserted"><ins><em>show them
targeted ads.</dd>
<dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
+of hiding</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>has
full access</em></ins></span> to <span class="removed"><del><strong>truly
protect people's privacy, we must prevent Google</strong></del></span> <span
class="inserted"><ins><em>users'
text messages.</dd>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs</em></ins></span>
- for <span class="removed"><del><strong>granted
that</strong></del></span> <span class="inserted"><ins><em>other apps and also
core system logs. TigerVPN developers have
+ <dt>DroidVPN</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in the first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> <span
class="inserted"><ins><em>TigerVPN</dt>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
+ for other apps</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
<dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over to the UK government if requested.</dd>
+ may turn them over</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>HTML pages
returned</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as any other snooping.</p>
+ <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p>
+
</li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span class="inserted"><ins><em>the
- users. The stated purpose of the JS injection is</em></ins></span> to
<span class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>display ads. Uses
+
+ <li><p>More than 73%</strong></del></span>
+ <span class="inserted"><ins><em>users. The stated
purpose</em></ins></span> of the <span class="removed"><del><strong>most
popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>JS
injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>also uses
roughly
- five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
- the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection for
- tracking the user and displaying ads.</dd>
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>also uses roughly
+ five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span class="inserted"><ins><em>this app have
confirmed that</em></ins></span>
+ the <span class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span> <span class="inserted"><ins><em>non-premium
version of</em></ins></span> the <span class="removed"><del><strong>500 most
popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way to say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection</em></ins></span> for
<span class="removed"><del><strong>granted that</strong></del></span>
+ <span class="inserted"><ins><em>tracking</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>user</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
</dl></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
@@ -1516,12 +1517,8 @@
a server every phone number</strong></del></span>
<span class="inserted"><ins><em><li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="removed"><del><strong>the user types into it</a>; the server
records these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>include</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ <p>Apps</em></ins></span> that <span
class="inserted"><ins><em>include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
such as Facebook, Google+ and Twitter.</p>
@@ -1529,14 +1526,18 @@
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated</em></ins></span> to <span class="removed"><del><strong>install
even</strong></del></span> <span class="inserted"><ins><em>the app's
functionality, was <a
+ unrelated to</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular</em></ins></span> gratis <span
class="removed"><del><strong>apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>Android apps</a>.</p>
+ found in</em></ins></span> the <span class="removed"><del><strong>server
records</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ <p>The article should not have described</em></ins></span> these
<span class="removed"><del><strong>numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>apps as
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
<p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
@@ -1555,245 +1556,186 @@
third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span>
+ <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
<span class="inserted"><ins><em><li id="M201508210">
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span>
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>still counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
- </li>
-
- <li><p>There is also a feature for web sites to track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span class="inserted"><ins><em>some are starting
- to realize that</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
- </li>
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all the
photos</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and
+ <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>some are starting
+ to realize that it is nasty.</p>
+
+ <p>This article shows the <a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that</em></ins></span> they <span
class="removed"><del><strong>make.</p>
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
-
- <p>This article shows the</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</em></ins></span> that <span class="removed"><del><strong>can
be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>they present snooping as a way to “serve”
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps</strong></del></span> <span class="inserted"><ins><em>present
snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>attitude of the proprietary software industry
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506264">
+ <li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
- Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>paid
- proprietary apps,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>was only 60%.</p>
+ study in 2015</a> found that 90% of the top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries. For the paid
+ proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span
class="inserted"><ins><em>them are not in fact <a
+ “free”, but most of</em></ins></span> them <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span>
- is <span class="removed"><del><strong>the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-<ul>
- <li><p>Tracking software in popular</strong></del></span>
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>the
average.</p>
+ </li>
- <li><p>Android tracks location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
+ <li id="M201504060">
+ <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>the
user</a>. This</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>in addition to
+ the snooping done</em></ins></span> by the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>phone company, and perhaps by the OS in
+ the phone.</p>
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li>
+ <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
- <li><p>According</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to turn the phones
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>off, listen to the microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>average.</p>
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>whether the app developers
+ get users to say “I agree”. That</em></ins></span> is <span
class="inserted"><ins><em>no excuse for
+ malware.</p>
</li>
- <li id="M201504060">
- <p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user</a>.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>in addition</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ <li id="M201411260">
+ <p>Many proprietary apps for mobile devices
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in</em></ins></span> a way <span
class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not</em></ins></span>
+ as <span class="inserted"><ins><em>bad as what the others do.</p>
</li>
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested</strong></del></span>
- <span class="inserted"><ins><em>the snooping done</em></ins></span> by the
<span class="removed"><del><strong>user, clearly must constitute spying of some
- kind.</p></li>
+ <li id="M201401150.1">
+ <p>The Simeji keyboard is</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <li><p>A Motorola</strong></del></span> phone
- <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <li><p>Spyware in iThings:
+ the</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
</li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>OS</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us</strong></del></span>
- <span class="inserted"><ins><em>the phone.</p>
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
- <p>Don't be distracted</em></ins></span> by <span
class="removed"><del><strong>a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>question of
whether</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>app developers
- get users to say “I agree”. That</em></ins></span> is
- <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>no excuse for
- malware.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose</em></ins></span> is
<span class="removed"><del><strong>also a feature for web
sites</strong></del></span> to <span class="removed"><del><strong>track users,
which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS
6,</strong></del></span> <span class="inserted"><ins><em>restrict the
+ use of data on the user's computer,</em></ins></span> but it
+ <span class="removed"><del><strong>is still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411260">
- <p>Many proprietary apps for mobile devices
- report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p></em></ins></span>
+ <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</em></ins></span> for <span
class="inserted"><ins><em>use by companies</a>.</p>
- <span class="inserted"><ins><em><li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method Editor">IME</abbr></a>.</p>
+ <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>state</a>.</p>
</li>
- <li id="M201312270">
- <p>The</em></ins></span> nonfree Snapchat app's principal purpose is
to restrict the
- use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
- <span class="inserted"><ins><em>numbers</a>.</p>
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all the</strong></del></span> <span
class="inserted"><ins><em>user to
+ approve sending personal</em></ins></span> data <span
class="removed"><del><strong>in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>to the app
developer but did not ask
+ about sending</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
</li>
- <li id="M201312060">
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> to
<span class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
+ the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app and dis-service spy on users even more than
users
- expected. It</strong></del></span>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks location for Google</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201307110">
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
+ <p>Skype contains</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
- <li><p>AI-powered driving apps can</strong></del></span>
+ <li><p>Some portable phones</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
+ Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></em></ins></span>
+ specifically for spying</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -1803,106 +1745,84 @@
<ul class="blurbs">
<li id="M201806240">
- <p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>sends
it</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p></em></ins></span>
+ <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it to third parties</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Facebook's app listens all</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804144">
+ <li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to</em></ins></span> the <span
class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>massive
- multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to</em></ins></span> snoop on <span class="removed"><del><strong>what
people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p>
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>the massive
+ multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>snoop on all
open processes running on its user's computer</a>.</p>
</li>
<li id="M201711070">
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information</em></ins></span> to <span class="removed"><del><strong>turn
the phones</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201512290">
- <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report</em></ins></span> to
<span class="removed"><del><strong>personal data in</strong></del></span> the
<span class="removed"><del><strong>device</a>.
- </p></strong></del></span>
+ <li id="M201512290">
+ <p>Many <a
+
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop</em></ins></span> on <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read the contact list. This
malware</strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p></em></ins></span>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
+ <span class="inserted"><ins><em>a nonfree operating system.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some</strong></del></span>
+ <li id="M201509160">
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
- information</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> about <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>their users and their</em></ins></span> users' <span
class="removed"><del><strong>searches that Google normally gets
when</strong></del></span>
- <span class="inserted"><ins><em>friends and associates</a>.</p>
-
- <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>data
- collected by various cr…apps</em></ins></span> and <span
class="removed"><del><strong>the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p>
- </li>
+ collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
+ friends and associates</a>.</p>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span> <span class="inserted"><ins><em>sites made by
different
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>data
+ collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
+ <p>They use this data to manipulate people to buy things, and hunt
for
+ “whales” who can be led to spend a lot</em></ins></span> of
<span class="removed"><del><strong>some
+ kind.</p></li>
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>manipulate people to
buy things, and hunt for
- “whales” who</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>be led
to spend a lot</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>money. They also
- use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts,
it</strong></del></span> <span class="inserted"><ins><em>game play for specific
players.</p>
-
- <p>While the article describes gratis games, games that cost
money</em></ins></span>
- can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
+ use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>use the same tactics.</p>
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <li id="M201401280">
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games that cost money</em></ins></span>
+ can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
</li>
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
- to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <li id="M201401280">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
+ to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -1911,21 +1831,23 @@
More about NSA app spying</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
<span class="inserted"><ins><em><li id="M200510200">
<p>Blizzard Warden is a hidden
- “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>what users
post</strong></del></span> <span class="inserted"><ins><em>every process
running</em></ins></span> on <span class="removed"><del><strong>various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+ good deal of personal data</a>, including lots of activities
which</em></ins></span>
+ have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1938,348 +1860,488 @@
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
- is in</strong></del></span> <span class="inserted"><ins><em>people that
use them</a>.</p>
-
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="inserted"><ins><em>people that</em></ins></span> use <span
class="removed"><del><strong>of data on</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
+
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+
+ <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app</strong></del></span>
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li><p>The Sarahah app</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in</em></ins></span>
the <span class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span class="removed"><del><strong>service.</p>
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email
addresses</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>user's address
+ book to developer's server. Note that this article
misuses</strong></del></span> the <span
class="inserted"><ins><em>own</em></ins></span> words
+ <span class="removed"><del><strong>“<a
href="/philosophy/free-sw.html">free software</a>”
+ referring to zero price.</p>
</li>
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO,</em></ins></span> and <span class="removed"><del><strong>snooping).
In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span> <span
class="inserted"><ins><em>this data is sold</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>third
parties. This is in return for
- “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>some
- are starting</strong></del></span> <span
class="inserted"><ins><em>slightly
+ <li>
+ <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>of</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable, according to him,
- is</em></ins></span> that it is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span>
- <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the <span
class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>scenes,
- and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
- those they have subjugated.</p>
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p>
+ </li>
- <p>Out, out, damned Spotify!</p>
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable,
according</em></ins></span> to <span class="removed"><del><strong>do lots of
surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</strong></del></span> <span
class="inserted"><ins><em>him,
+ is that</em></ins></span> it <span class="removed"><del><strong>demands to
personal data</strong></del></span> <span class="inserted"><ins><em>is
opt-in</em></ins></span> in <span class="inserted"><ins><em>newer models. But
since</em></ins></span> the <span class="removed"><del><strong>device</a>.
+ </p>
</li>
- <li><p>Many proprietary apps</strong></del></span>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>it will</a>
+ pre-install on some of its phones. The app</strong></del></span> <span
class="inserted"><ins><em>all future updates</em></ins></span> will <span
class="removed"><del><strong>give Verizon the same
+ information about</strong></del></span> <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span>
<span class="inserted"><ins><em>settings unchanged.</p>
- <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>mobile devices
report which other
- apps</strong></del></span> <span class="inserted"><ins><em>that
- matter),</em></ins></span> the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on
you</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
- <span class="inserted"><ins><em>to disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>terrestrial antenna
- instead. Unfortunately, this</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software),</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>set up a
- firewall to block connections to Vizio's servers. Or,</em></ins></span> as
<span class="removed"><del><strong>what the others do.</p>
- </li>
+ <p>If you already own a Vizio smart TV (or any smart TV,
for</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
+ they use its search engine.</p>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>a last resort,
- you can replace your TV with another model.</p></em></ins></span>
+ <p>Currently,</strong></del></span>
+ <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't
spying</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>you is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software),</em></ins></span>
and <span class="inserted"><ins><em>set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>article
for</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>facts it presents. It
- is too bad that</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted</strong></del></span> <span
class="inserted"><ins><em>article finishes</em></ins></span> by <span
class="inserted"><ins><em>advocating</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span>
- <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users</strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
+ <p>We link to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>article for the
facts it presents. It
+ is too bad that</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
+ still spyware.</p>
</li>
- <li><p>The Brightest Flashlight</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix</em></ins></span> app <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
+ <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
- <p>The FTC criticized this app because it
asked</strong></del></span>
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>image is coming from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending it to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
- the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p>
- </li>
-</ul>
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
-<ul>
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the</em></ins></span> surveillance.</p>
+ </li>
- <li>
- <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>disable the
- surveillance, even if it were not hidden as it</em></ins></span> was <span
class="removed"><del><strong>found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of</strong></del></span> <span class="inserted"><ins><em>in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The “smart” toys My Friend Cayla</strong></del></span>
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
<span class="inserted"><ins><em><li id="M201511130">
- <p>Some web</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>TV
advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
- a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware running
- on other devices</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to
determine that they
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys</strong></del></span>
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="removed"><del><strong>a mobile phone. This would
- enable crackers to listen in on a child's speech,</strong></del></span>
<span class="inserted"><ins><em>Web activity,</em></ins></span> and <span
class="removed"><del><strong>even speak
- into the toys themselves.</p>
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li>
- <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
- <li id="M201511060">
+ <span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>its users through the proprietary control
app</a>.</p>
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
+ <span class="inserted"><ins><em>across devices.</p>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>their users: their <a
-
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
- <p>It is possible to turn this off, but having</em></ins></span> it
<span class="removed"><del><strong>was surrounded</strong></del></span> <span
class="inserted"><ins><em>enabled</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>default
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard</strong></del></span> <span class="inserted"><ins><em>company
- already monitors. Tivo customers are unaware they're
+ <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>company
+ already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore, even if the user didn't “upload” them to the
service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>unaware
they're
being watched by advertisers. By combining TV viewing
- information</em></ins></span> with <span
class="removed"><del><strong>which manufacturers would make statements about
- their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>online social media participation, Tivo can now
<a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
- users <span class="removed"><del><strong>could have
- checked</strong></del></span> <span class="inserted"><ins><em>to new
combined surveillance by default.</p>
+ users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
</li>
<li id="M201507240">
- <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>changed.</p>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
- <p>The company that made the vibrator</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about
how</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what</em></ins></span> people <span class="removed"><del><strong>used
it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>are watching</a>, even if</em></ins></span> it
<span class="removed"><del><strong>had sold the data to</strong></del></span>
<span class="inserted"><ins><em>isn't</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able to figure out
- who the user was.</p>
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
-
- <li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they
wanted</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span>
- <span class="inserted"><ins><em>record</a>.</p>
- </li>
+ snoops on what programs people watch,</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
+ record</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
+ used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="removed"><del><strong>the
user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question of whether the app
developers get</strong></del></span> <span
class="inserted"><ins><em>what</em></ins></span>
+ users <span class="removed"><del><strong>to say “I agree”.
That is no excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized this app
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>another company,
Nuance</a>.
+ Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> it to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
the
+ <span class="removed"><del><strong>weakness of the
reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
- <li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used</em></ins></span> a <span class="removed"><del><strong>total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>firmware
“upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make</em></ins></span> its <span
class="removed"><del><strong>customers.</p></strong></del></span> <span
class="inserted"><ins><em>TVs snoop on what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>anyone? A</strong></del></span> <span
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
+ software <span class="removed"><del><strong>flashlight
+ app would not.</p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502090">
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
- Nuance can save it</em></ins></span> and <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>US or some
- other government.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>be trusted unless it is done</em></ins></span> by
<span class="removed"><del><strong>itself.</p></li>
+<ul>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>free
- software in your own computer.</p>
+ <li>
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>third
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based</strong></del></span> in <span
class="removed"><del><strong>the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in
on a child's speech, and even speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>third
parties</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon</em></ins></span> “Smart” <span
class="removed"><del><strong>Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>TV</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
+ snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their users</a>.</p></em></ins></span>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to report <span class="removed"><del><strong>its location to someone else and
to transmit
- conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>what the
- user watches—no exceptions!</p></em></ins></span>
+ <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ </li>
+
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing; the server could save that</em></ins></span> data
<span class="removed"><del><strong>may be
+ true, but</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em><a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
+
+ <p>LG later said</em></ins></span> it had <span
class="removed"><del><strong>sold the data to</strong></del></span> <span
class="inserted"><ins><em>installed</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who the user was.</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ </li>
+</ul>
+
+
+<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span <span class="removed"><del><strong>class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
+
+<ul>
+ <li>
+ <p>An LG “smart” watch is designed</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>someone else and</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
+ at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>transmit
+ conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
- <p>The article says</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> this <span
class="removed"><del><strong>is a back door, but</strong></del></span> <span
class="inserted"><ins><em>off has
- no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em>the transmission reports</em></ins></span> a
- <span class="removed"><del><strong>misunderstanding.
However,</strong></del></span> <span class="inserted"><ins><em>404 error
- really means nothing; the server could save that data anyway.)</p>
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>these
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250"></em></ins></span>
+ <p>The <span class="removed"><del><strong>article says
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam
“smart” camera</em></ins></span> is <span
class="removed"><del><strong>a back door, but that could be a
+ misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches</em></ins></span> it <span
class="inserted"><ins><em>“off.”</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is certainly surveillance, at
- least.</p>
+ <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>using it
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul>
-<li><p></strong></del></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
- <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2289,12 +2351,41 @@
<ul>
<li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span> <span class="inserted"><ins><em>the code
could surely convert it
+ into one.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>stop this, but
any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
@@ -2312,125 +2403,121 @@
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>way.</p>
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p></em></ins></span>
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of
C$4m</a></em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch the people who are watching TV.</p>
- </li>
-</ul></em></ins></span>
-
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
+<ul>
<li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is a surveillance device.</strong></del></span>
+ <p>Every “home security” camera,
if</strong></del></span> its <span class="removed"><del><strong>manufacturer
can communicate</strong></del></span>
+ <span class="inserted"><ins><em>customers.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span> <a
+ <li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>it,
+ is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
- long-term.</p>
-
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p></em></ins></span>
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a>
collected</em></ins></span> by the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>The article <span class="removed"><del><strong>describes
wrongdoing by the manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>focuses</em></ins></span> on <span
class="inserted"><ins><em>how Ring used to let individual employees look
- at</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent</em></ins></span> that
- <span class="inserted"><ins><em>secondary abuse, but</em></ins></span> the
<span class="removed"><del><strong>device is tethered</strong></del></span>
<span class="inserted"><ins><em>primary abuse—that Amazon gets the
- video—Amazon expects society</em></ins></span> to <span
class="inserted"><ins><em>surrender to.</p>
+ <p>That</em></ins></span> the <span class="removed"><del><strong>fact
+ that</strong></del></span> <span class="inserted"><ins><em>manufacturer
and</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>FBI could listen
to these
+ conversations was unacceptable by itself.</p>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>server.</p>
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span> a <span
class="removed"><del><strong>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>better
- name!</p>
+ <p>But it</strong></del></span> <span
class="inserted"><ins><em>speech recognition
+ company based in the U.S.</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>suggested</em></ins></span> that <span
class="inserted"><ins><em>these
- manufacturers promise not to look at what's in</em></ins></span> the <span
class="removed"><del><strong>device gives the company</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
- </li>
-
- <li id="M201603220">
- <p>Over 70 brands of network-connected</em></ins></span>
surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>cameras have <a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
+ <p>Those toys</em></ins></span> also <span
class="removed"><del><strong>demonstrates that</strong></del></span> <span
class="inserted"><ins><em>contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>company
+ surveillance capability.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511250"></em></ins></span>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ <span class="removed"><del><strong><li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
- <p>A “smart” <span class="removed"><del><strong>device
means the manufacturer is using it to outsmart
- you.</p>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means the manufacturer is using
it</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on children and adults</a>.</p></em></ins></span>
</li>
</ul>
+
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>E-books can contain JavaScript code,
and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+ this code snoops</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not only the
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
they report even which page the user reads at what
time</a>.</p>
</li>
<li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>device
means the manufacturer is using it</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
+ needed to check DRM!</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
@@ -2440,97 +2527,85 @@
</li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201904240">
+ <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
- into one.</p>
- </li>
+ <p>That's easy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
+ voice assistants</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>similar things.</p>
+
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span
class="removed"><del><strong>if it asked for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
+ access. The software in the car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
- <li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
- </li>
-
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
- and changed.</p>
-
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
-
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="inserted"><ins><em><a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span class="inserted"><ins><em>its
- customers.</p></em></ins></span>
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>client
program is nonfree, and data processing is done
+ “<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
+ the <span class="removed"><del><strong>phone company</strong></del></span>
<span class="inserted"><ins><em>cloud</a>” (a soothing way of
saying “We won't
+ tell you how and where it's done”), users have no
way</em></ins></span>
+ to <span class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
others.</p>
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ paid for.</p>
- <li><p>Tesla cars allow</strong></del></span> the <span
class="removed"><del><strong>company to extract data remotely and
- determine</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ working order.</p>
+ </li>
+
+ <li id="M201808120">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data
- and hand it over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p></em></ins></span>
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+ and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn</em></ins></span> it <span class="removed"><del><strong>doesn't
+ store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -2539,217 +2614,96 @@
<div style="clear: left;"></div>
<ul>
- <li><p>Lots of</strong></del></span>
+ <li><p>Lots</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>products are
- designed</strong></del></span> <span class="inserted"><ins><em>toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>everyone</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
- company based</em></ins></span> in the <span
class="removed"><del><strong>house, all the time</a>.</p>
-
- <p>Today's technological practice does not include any way of
- making a device that</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>obey your voice commands without
- potentially spying</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>you. Even if it is air-gapped, it could be
- saving up records about you for later examination.</p>
- </li>
-
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+ <li id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ <li id="M201706204">
+ <p>Lots</em></ins></span> of “smart” products are
designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in the house, all the time</a>.</p>
+
+ <p>Today's technological practice does not include any way of making
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Nest</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
+ </li>
+
+ <span
class="removed"><del><strong><li><p><a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201310260">
+ <p><a</em></ins></span>
+
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul>
<li>
<p>Vizio
“smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>them, and not just broadcasts
+ report everything that is viewed on them, and not just broadcasts
and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-
-<ul class="blurbs">
- <li id="M201904240">
- <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is.</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>.</em></ins></span>
The <span class="removed"><del><strong>existence</strong></del></span> <span
class="inserted"><ins><em>Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>a way to
- disable</strong></del></span> the <span
class="removed"><del><strong>surveillance,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span
class="removed"><del><strong>if it were not hidden as it was in
+ computer, the TV reports what it is. The existence of a way to
+ disable the surveillance, even if it were not hidden as it was in
these TVs, does not legitimize the surveillance.</p>
</li>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>has access
to</em></ins></span> <a
+ <li><p>More or less all “smart”
TVs</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201807260">
+ <p>Tommy Hilfiger clothing</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+ <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often people wear it</a>.</p></em></ins></span>
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>saying “We won't
- tell you how and where it's done”), users have no
way</em></ins></span>
- to <span class="removed"><del><strong>get users' formal
+ <p>This <span class="removed"><del><strong>shows that laws requiring
products to get users' formal
consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span
class="inserted"><ins><em>know</em></ins></span> what happens <span
class="removed"><del><strong>if a user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
+ And what happens if a user declines consent? Probably the
TV</strong></del></span> will <span class="removed"><del><strong>say,
“Without your consent to tracking,</strong></del></span> <span
class="inserted"><ins><em>teach</em></ins></span> the <span
class="removed"><del><strong>TV will
not work.”</p>
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
-
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
- paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
- paid for.</p>
-
- <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
- specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
- restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
- working order.</p>
- </li>
-
- <li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break the security of an Amazon device,
- and <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
- turn <span class="removed"><del><strong>this off, but
having</strong></del></span> it <span class="removed"><del><strong>enabled by
default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>into a
listening device</a> for them.</p>
-
- <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>do this, or
cease</em></ins></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>sell the
product</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>that country,
- do you think Amazon would have the moral fiber</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
-
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
- correlate ads with Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>probably
hackers too, but please</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>gratis
electronic toothbrush that snoops on its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
- <p>Lots of “smart” products are
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house,</em></ins></span> all the
time</a>.</p>
-
- <span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p>
- </li>
-
- <li id="M201310260">
- <p><a
-
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
-</div>
-
-<ul class="blurbs">
- <li id="M201807260">
- <p>Tommy Hilfiger clothing <a
-
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
-
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
- monitor every aspect of what they do.</p>
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
+ monitor every aspect of</em></ins></span> what
+ <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
@@ -2757,20 +2711,38 @@
<ul class="blurbs">
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However,</em></ins></span> it <span
class="inserted"><ins><em>is certainly surveillance, at least.</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
- too</a>.</p>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>report
its location</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>someone else</em></ins></span> and
+ <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
+ too</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2780,12 +2752,32 @@
<ul class="blurbs">
<li id="M201903290">
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
<span class="removed"><del><strong>would then have to
- give it</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>US or some
other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>driver's personal data goes with
- them</a>.</p>
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV
+ <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
+ them</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
+ give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
+ <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
+ antenna in aluminum foil?</p>
</li>
<li id="M201811300">
@@ -3411,7 +3403,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:24 $
+$Date: 2019/05/08 12:31:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary-surveillance.de.po 27 Apr 2019 20:00:25 -0000 1.285
+++ proprietary-surveillance.de.po 8 May 2019 12:31:42 -0000 1.286
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4186,6 +4186,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In China, it is mandatory for electric cars to be equipped with a terminal "
"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
"transfers technical data, including car location, to a government-run "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.423
retrieving revision 1.424
diff -u -b -r1.423 -r1.424
--- proprietary-surveillance.fr.po 28 Apr 2019 13:35:40 -0000 1.423
+++ proprietary-surveillance.fr.po 8 May 2019 12:31:42 -0000 1.424
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-04-28 15:33+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3614,6 +3615,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In China, it is mandatory for electric cars to be equipped with a terminal "
"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
"transfers technical data, including car location, to a government-run "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary-surveillance.it-diff.html 27 Apr 2019 20:00:25 -0000
1.137
+++ proprietary-surveillance.it-diff.html 8 May 2019 12:31:42 -0000
1.138
@@ -1332,141 +1332,336 @@
<p>Following this lawsuit,
<a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total</strong></del></span> <span
class="inserted"><ins><em>interface</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>most of them was designed to make uninstallation
+ to its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>most of them was designed</em></ins></span> to <span
class="removed"><del><strong>the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="inserted"><ins><em>potential risk because
+ there is no easy</em></ins></span> way <span
class="removed"><del><strong>to access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and</strong></del></span> <span
class="inserted"><ins><em>of knowing what they really do.</p>
</li>
<li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users. Other
technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="inserted"><ins><em><a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
+
+ <p>It</em></ins></span> is <span class="removed"><del><strong>not
really
+clean since</strong></del></span> <span class="inserted"><ins><em>unfortunate
that these articles talk about “free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
</li>
<li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
+ being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>what</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>about a side issue. What</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>a secondary issue.
The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
tracking people's locations.</p>
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not</strong></del></span>
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span
class="inserted"><ins><em>say that</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>has a Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed to check DRM!</p>
</li>
+</ul>
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users that have deleted
them</a>.</p></em></ins></span>
+ </li>
+
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
<p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ many ways. This is one more.</p></em></ins></span>
</li>
- <li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+ source code they cannot look at.</em></ins></span> The other
+ <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
+ in <span class="removed"><del><strong>the car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
+ their users. To protect their privacy</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
+ need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information about its users.
+ <p>Grindr should not have so much information</em></ins></span>
about <span class="inserted"><ins><em>its users.
It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ other but not to</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
</li>
- <li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201803050">
+ <p>The moviepass app and dis-service</em></ins></span>
+ spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p>
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
- <li id="M201711240">
- <p>Tracking software in popular Android apps
+<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+ follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>physical store by
noticing WiFi
networks</a>.</p>
</li>
@@ -1474,7 +1669,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1482,27 +1677,41 @@
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ calls</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages</em></ins></span> and
<span class="inserted"><ins><em>emails to snoopers</a>.</p>
+
+ <p>Google did</em></ins></span> not <span
class="removed"><del><strong>just broadcasts</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ <p>On</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps, and
+ therefore shares in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>responsibility
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their
being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
-
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
+ <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
+ cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in</strong></del></span> <span class="inserted"><ins><em>source code
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and
study</em></ins></span>
+ the <span class="removed"><del><strong>surveillance.</p>
+ </li>
+
+ <li><p>More</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
+ various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs</strong></del></span>
+ <span class="inserted"><ins><em>prevent such snooping, except when the app
developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1511,14 +1720,19 @@
</li>
<li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+ <p>Apps for BART</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop</em></ins></span> on <span
class="removed"><del><strong>their</strong></del></span>
users</a>.</p>
+
+ <span class="removed"><del><strong><p>The report was as of 2014, but
we</strong></del></span>
+
+ <span class="inserted"><ins><em><p>With free software apps, users
could <em>make sure</em> that they</em></ins></span>
+ don't <span class="removed"><del><strong>expect this has got
better.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
- don't snoop.</p>
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
+ <p>With proprietary apps, one can only hope</em></ins></span> that
<span class="removed"><del><strong>laws requiring products to
get</strong></del></span> <span class="inserted"><ins><em>they don't.</p>
</li>
<li id="M201705040">
@@ -1986,18 +2200,16 @@
across devices.</p>
<p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p></em></ins></span>
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>microphones</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
</li>
@@ -2026,15 +2238,14 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it</em></ins></span> to the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>US or some
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
@@ -2055,113 +2266,51 @@
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span class="inserted"><ins><em>TV
will not
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
-
- <p>That</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>other
devices</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
-
- <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>patch to
stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -2175,38 +2324,16 @@
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
manufacturers promise not to look at what's in the videos. That's not
- security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
</li>
<li id="M201603220">
@@ -2215,72 +2342,28 @@
security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250"></em></ins></span>
+ <li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
<span class="removed"><del><strong>to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>to outsmart
you.</p></em></ins></span>
- </li>
-<span class="inserted"><ins><em></ul>
-
<div class="big-subsection">
<h4 id="SpywareInToys">Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
+ listening device, remote changes to the code could surely convert it
into one.</p>
</li>
@@ -2293,152 +2376,102 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
+ minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>data
to a data
- broker,</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>data broker would
have been able</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
<p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>time; it is
possible</strong></del></span> <span class="inserted"><ins><em>company has been
ordered to pay a total of C$4m</a></em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span class="inserted"><ins><em>its
- customers.</p></em></ins></span>
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
- <li><p>Tesla cars allow</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
-
- <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ <p>That the manufacturer and the FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
- company <span class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502180">
+ <li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ going to spy on children and adults</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
- </li>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p></em></ins></span>
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>Alexa service are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and <span class="removed"><del><strong>not just
broadcasts</strong></del></span> <span class="inserted"><ins><em>Apple
+ <p>Some of</em></ins></span> users' <span
class="removed"><del><strong>formal
+ consent before collecting</strong></del></span> <span
class="inserted"><ins><em>commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
<p>A fraction of the Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>other personal data</a>.</p>
+ location and other</em></ins></span> personal <span
class="inserted"><ins><em>data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>nonfree,
and data processing is done
- “<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
- the <span class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing
way</em></ins></span> of <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
- tell you how and where it's done”), users have no</em></ins></span>
way
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>know what happens to</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it</strong></del></span>
<span class="inserted"><ins><em>recordings unless human eavesdroppers <a
+ <p>Since the client program is nonfree, and</em></ins></span> data
<span class="removed"><del><strong>are totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>processing is
done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know</em></ins></span> what happens <span
class="removed"><del><strong>if a</strong></del></span> <span
class="inserted"><ins><em>to the recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
@@ -2447,44 +2480,33 @@
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>not hidden
as</strong></del></span>
- <span class="inserted"><ins><em>paid for.</p>
+ communicates with HP servers</a> to make sure the</em></ins></span>
user <span class="removed"><del><strong>declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>is still
+ paying for</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
- restrictions</em></ins></span> in
- <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
- working order.</p></em></ins></span>
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of ink cartridges that would otherwise be in
+ working order.</p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <li id="M201808120">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
+ <p>It was very difficult for them to do this. The
job</em></ins></span> would <span class="removed"><del><strong>say that TVs are
not allowed</strong></del></span> <span class="inserted"><ins><em>be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>do this, or cease to
sell</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ <p>These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
@@ -2511,27 +2533,18 @@
about you for later examination.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to</strong></del></span>
<span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p>
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about</em></ins></span> the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
@@ -2547,10 +2560,10 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
- monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal that companies
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2559,23 +2572,31 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>an Android app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ that connects</em></ins></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>an unidentified
site</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201407090">
- <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
- too</a>.</p>
+ <li id="M201407090">
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to <span class="removed"><del><strong>determine that they are nearby.
Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else</em></ins></span>
and
+ <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
+ too</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2588,44 +2609,58 @@
<p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span
class="inserted"><ins><em>junkyard the driver's personal data goes with
+ when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV
+ <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
them</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201811300">
- <p>In China, it is mandatory for electric
- cars to be equipped with a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
+ give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
+ <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
+ <li id="M201811300">
+ <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
+ cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ forward</em></ins></span> it <span class="removed"><del><strong>is done
+ by free software</strong></del></span> <span class="inserted"><ins><em>to
the government-run platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
-
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will</strong></del></span> <span
class="inserted"><ins><em>movements, tracking passengers' cell
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a></em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
+
+ <p>In</strong></del></span> its <span
class="removed"><del><strong>privacy policy, Samsung explicitly
confirms</strong></del></span>
+ <span class="inserted"><ins><em>“connected” cars, minute by
minute.</p>
+
+ <p>GM did not get users' consent, but it could have
got</em></ins></span> that <span class="removed"><del><strong><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will</strong></del></span> <span
class="inserted"><ins><em>easily by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
<p>But if you really want</em></ins></span> to
@@ -3165,7 +3200,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary-surveillance.it.po 27 Apr 2019 20:00:25 -0000 1.298
+++ proprietary-surveillance.it.po 8 May 2019 12:31:42 -0000 1.299
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3941,6 +3941,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In China, it is mandatory for electric cars to be equipped with a terminal "
"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
"transfers technical data, including car location, to a government-run "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary-surveillance.ja-diff.html 27 Apr 2019 20:00:25 -0000
1.147
+++ proprietary-surveillance.ja-diff.html 8 May 2019 12:31:43 -0000
1.148
@@ -2537,6 +2537,19 @@
them</a>.</p>
</li>
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201811300">
<p>In China, it is mandatory for electric
cars to be equipped with a terminal that <a
@@ -3032,7 +3045,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary-surveillance.ja.po 27 Apr 2019 20:00:25 -0000 1.271
+++ proprietary-surveillance.ja.po 8 May 2019 12:31:44 -0000 1.272
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3346,6 +3346,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In China, it is mandatory for electric cars to be equipped with a terminal "
"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
"transfers technical data, including car location, to a government-run "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary-surveillance.pot 27 Apr 2019 20:00:25 -0000 1.219
+++ proprietary-surveillance.pot 8 May 2019 12:31:44 -0000 1.220
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2464,6 +2464,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a "
+"href=\"https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\">
"
+"near-complete access to the internal car network</a>. It is constantly "
+"connected to the cellular phone network and sends Ford a lot of data, "
+"including car location. This feature operates even when the ignition key is "
+"removed, and users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In China, it is mandatory for electric cars to be equipped with a terminal "
"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
"transfers technical data, including car location, to a government-run "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.517
retrieving revision 1.518
diff -u -b -r1.517 -r1.518
--- proprietary-surveillance.ru.po 28 Apr 2019 10:29:28 -0000 1.517
+++ proprietary-surveillance.ru.po 8 May 2019 12:31:44 -0000 1.518
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3569,6 +3570,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In China, it is mandatory for electric cars to be equipped with a terminal "
"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
"transfers technical data, including car location, to a government-run "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary.de-diff.html 27 Apr 2019 20:00:25 -0000 1.90
+++ proprietary.de-diff.html 8 May 2019 12:31:44 -0000 1.91
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
@@ -127,17 +127,17 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -257,22 +270,6 @@
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
-
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
-
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
- sued over this fraud</a>.</p>
- </li>
</ul></em></ins></span>
@@ -333,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.de.po 27 Apr 2019 20:00:25 -0000 1.132
+++ proprietary.de.po 8 May 2019 12:31:44 -0000 1.133
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -517,56 +534,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
-# | programmed its car engine computers to {+<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
-# | detect the Environmental Protection Agency's emission tests</a>, and run
-# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
-# | standards by a factor of up to 35.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
-#| "rest of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
-"und fuhr ansonsten unsauber."
-
-#. type: Content of: <ul><li><p>
-# | Using free software would not have stopped Volkswagen from programming it
-# | this way, but would have made it harder to [-conceal.-] {+conceal, and
-# | given the users the possibility of correcting the deception.+}
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
-"programmieren, hätte es aber erschwert es zu verbergen."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -669,6 +636,37 @@
#, fuzzy
#~| msgid ""
+#~| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+#~| "emissions\"> Volkswagen programmed its car engine computers to detect "
+#~| "the Environmental Protection Agency's emission tests</a>, and run dirty "
+#~| "the rest of the time."
+#~ msgid ""
+#~ "Volkswagen programmed its car engine computers to <a href=\"https://www."
+#~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+#~ "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#~ "rest of the time. In real driving, the cars exceeded emissions standards "
+#~ "by a factor of up to 35."
+#~ msgstr ""
+#~ "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+#~ "emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, "
+#~ "unter: Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-"
+#~ "Bordrechner, um der US-Umweltschutzbehörde âsaubereâ Emissionstests "
+#~ "nachweisen zu können</a> und fuhr ansonsten unsauber."
+
+#, fuzzy
+#~| msgid ""
+#~| "Using free software would not have stopped Volkswagen from programming "
+#~| "it this way, but would have made it harder to conceal."
+#~ msgid ""
+#~ "Using free software would not have stopped Volkswagen from programming it "
+#~ "this way, but would have made it harder to conceal, and given the users "
+#~ "the possibility of correcting the deception."
+#~ msgstr ""
+#~ "Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise
"
+#~ "zu programmieren, hätte es aber erschwert es zu verbergen."
+
+#, fuzzy
+#~| msgid ""
#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
#~ msgid ""
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.es.po 1 May 2019 08:48:18 -0000 1.159
+++ proprietary.es.po 8 May 2019 12:31:44 -0000 1.160
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -441,41 +459,6 @@
"cantidad de tiempo que esto le hace perder con sus continuas conexiones y "
"fallos prematuros del equipo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen programó los ordenadores que controlan el motor de sus coches "
-"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-"
-"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
-"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En
"
-"situaciones reales, los coches producÃan emisiones que llegaban a "
-"multiplicar por 35 los estándares permitidos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"El uso de software libre no habrÃa impedido que Volkswagen lo programara de "
-"esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los "
-"usuarios la posibilidad de corregir el engaño."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-"Antiguos ejecutivos de Volkswagen están siendo <a href=\"https://www."
-"theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-"
-"years-in-prison\">encausados por este fraude</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -555,6 +538,38 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Volkswagen programmed its car engine computers to <a href=\"https://www."
+#~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+#~ "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#~ "rest of the time. In real driving, the cars exceeded emissions standards "
+#~ "by a factor of up to 35."
+#~ msgstr ""
+#~ "Volkswagen programó los ordenadores que controlan el motor de sus coches "
+#~ "para que <a href=\"https://www.petri.com/volkswagen-used-software-to-"
+#~ "cheat-on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+#~ "Protección Medioambiental</a>, y seguir contaminando el resto del tiempo.
"
+#~ "En situaciones reales, los coches producÃan emisiones que llegaban a "
+#~ "multiplicar por 35 los estándares permitidos."
+
+#~ msgid ""
+#~ "Using free software would not have stopped Volkswagen from programming it "
+#~ "this way, but would have made it harder to conceal, and given the users "
+#~ "the possibility of correcting the deception."
+#~ msgstr ""
+#~ "El uso de software libre no habrÃa impedido que Volkswagen lo programara "
+#~ "de esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa
dado "
+#~ "a los usuarios la posibilidad de corregir el engaño."
+
+#~ msgid ""
+#~ "Former executives of Volkswagen are being <a href=\"https://www."
+#~ "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-"
+#~ "face-10-years-in-prison\"> sued over this fraud</a>."
+#~ msgstr ""
+#~ "Antiguos ejecutivos de Volkswagen están siendo <a href=\"https://www."
+#~ "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-"
+#~ "face-10-years-in-prison\">encausados por este fraude</a>."
+
+#~ msgid ""
#~ "Google tracks the movements of Android phones, and sometimes <a href="
#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
#~ "tracking-police.html\"> saves the data for years</a>."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.fr.po 28 Apr 2019 13:35:40 -0000 1.198
+++ proprietary.fr.po 8 May 2019 12:31:45 -0000 1.199
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-04-28 15:33+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -440,42 +458,6 @@
"financier combien de temps cela vous fait perdre en connexions interminables "
"et pannes matérielles prématurées."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'Ã 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-"Des anciens dirigeants de Volkswagen sont <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\">poursuivis pour cette fraude</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -549,3 +531,37 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Volkswagen programmed its car engine computers to <a href=\"https://www."
+#~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+#~ "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#~ "rest of the time. In real driving, the cars exceeded emissions standards "
+#~ "by a factor of up to 35."
+#~ msgstr ""
+#~ "Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+#~ "véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
+#~ "software-to-cheat-on-emissions\">détectent les essais antipollution de "
+#~ "l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+#~ "l'environnement des Ãtats-Unis)</a>… et polluent le reste du "
+#~ "temps. En conditions réelles, les voitures excédaient les normes "
+#~ "d'émission d'un facteur allant jusqu'à 35."
+
+#~ msgid ""
+#~ "Using free software would not have stopped Volkswagen from programming it "
+#~ "this way, but would have made it harder to conceal, and given the users "
+#~ "the possibility of correcting the deception."
+#~ msgstr ""
+#~ "L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+#~ "programmer ainsi ses ordinateurs, mais la fraude aurait été plus "
+#~ "difficile à cacher et les utilisateurs auraient eu une chance de la "
+#~ "corriger."
+
+#~ msgid ""
+#~ "Former executives of Volkswagen are being <a href=\"https://www."
+#~ "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-"
+#~ "face-10-years-in-prison\"> sued over this fraud</a>."
+#~ msgstr ""
+#~ "Des anciens dirigeants de Volkswagen sont <a href=\"https://www."
+#~ "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-"
+#~ "face-10-years-in-prison\">poursuivis pour cette fraude</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary.it-diff.html 27 Apr 2019 20:00:25 -0000 1.102
+++ proprietary.it-diff.html 8 May 2019 12:31:45 -0000 1.103
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
@@ -184,6 +184,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -256,22 +269,6 @@
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
-
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
-
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
- sued over this fraud</a>.</p>
- </li>
</ul></em></ins></span>
@@ -332,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary.it.po 27 Apr 2019 20:00:25 -0000 1.141
+++ proprietary.it.po 8 May 2019 12:31:45 -0000 1.142
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -521,29 +538,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.ja-diff.html 27 Apr 2019 20:00:25 -0000 1.103
+++ proprietary.ja-diff.html 8 May 2019 12:31:45 -0000 1.104
@@ -181,6 +181,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -253,22 +266,6 @@
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
-
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
-
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
- sued over this fraud</a>.</p>
- </li>
</ul></em></ins></span>
@@ -329,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.ja.po 27 Apr 2019 20:00:25 -0000 1.124
+++ proprietary.ja.po 8 May 2019 12:31:45 -0000 1.125
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -441,42 +458,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤åº"
-"ããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
-
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ãã"
-"ãã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -549,6 +530,33 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#, fuzzy
+#~| msgid ""
+#~| "Volkswagen programmed its car engine computers to detect the "
+#~| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#~| "of the time."
+#~ msgid ""
+#~ "Volkswagen programmed its car engine computers to <a href=\"https://www."
+#~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+#~ "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#~ "rest of the time. In real driving, the cars exceeded emissions standards "
+#~ "by a factor of up to 35."
+#~ msgstr ""
+#~
"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤"
+#~ "åºããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
+
+#, fuzzy
+#~| msgid ""
+#~| "Using free software would not have stopped Volkswagen from programming "
+#~| "it this way, but would have made it harder to conceal."
+#~ msgid ""
+#~ "Using free software would not have stopped Volkswagen from programming it "
+#~ "this way, but would have made it harder to conceal, and given the users "
+#~ "the possibility of correcting the deception."
+#~ msgstr ""
+#~
"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ã"
+#~ "ããã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
+
#
#
#, fuzzy
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary.nl-diff.html 27 Apr 2019 20:00:25 -0000 1.102
+++ proprietary.nl-diff.html 8 May 2019 12:31:45 -0000 1.103
@@ -101,20 +101,20 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
- <li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
</ul>
@@ -184,6 +184,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -256,22 +269,6 @@
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
-
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
-
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
- sued over this fraud</a>.</p>
- </li>
</ul></em></ins></span>
@@ -332,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary.nl.po 27 Apr 2019 20:00:25 -0000 1.113
+++ proprietary.nl.po 8 May 2019 12:31:45 -0000 1.114
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -514,29 +531,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary.pl-diff.html 27 Apr 2019 20:00:25 -0000 1.120
+++ proprietary.pl-diff.html 8 May 2019 12:31:45 -0000 1.121
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
+instances of malicious functionalities (with more than 450 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -132,11 +132,11 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -182,6 +182,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -254,22 +267,6 @@
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
-
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
-
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
- sued over this fraud</a>.</p>
- </li>
</ul></em></ins></span>
@@ -330,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:25 $
+$Date: 2019/05/08 12:31:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.pl.po 27 Apr 2019 20:00:25 -0000 1.108
+++ proprietary.pl.po 8 May 2019 12:31:45 -0000 1.109
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -596,29 +613,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.pot 27 Apr 2019 20:00:25 -0000 1.105
+++ proprietary.pot 8 May 2019 12:31:45 -0000 1.106
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a "
+"href=\"https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\">
"
+"near-complete access to the internal car network</a>. It is constantly "
+"connected to the cellular phone network and sends Ford a lot of data, "
+"including car location. This feature operates even when the ignition key is "
+"removed, and users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a "
"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
@@ -332,29 +349,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a "
-"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">
"
-"detect the Environmental Protection Agency's emission tests</a>, and run "
-"dirty the rest of the time. In real driving, the cars exceeded emissions "
-"standards by a factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a "
-"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\">
"
-"sued over this fraud</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.pt-br.po 29 Apr 2019 00:34:09 -0000 1.158
+++ proprietary.pt-br.po 8 May 2019 12:31:45 -0000 1.159
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-04-28 11:36-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -434,40 +452,6 @@
"financeiro como isso desperdiça seu tempo lidando com conexões
intermináveis "
"e falhas prematuras de hardware."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"A Volkswagen programou seus computadores com motor de carro para <a href="
-"\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\"> "
-"detectar os testes de emissões da Agência de Proteção Ambiental</a>, e "
-"funcionar incorretamente o resto do tempo. Na condução real, os carros "
-"superaram os padrões de emissão em um fator de até 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Usar o software livre não teria impedido a Volkswagen de programá-lo dessa "
-"maneira, mas teria dificultado a ocultação e dado aos usuários a "
-"possibilidade de corrigir o engano."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-"Ex-executivos da Volkswagen estão sendo <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> processados por esta fraude</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -543,6 +527,37 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Volkswagen programmed its car engine computers to <a href=\"https://www."
+#~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+#~ "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#~ "rest of the time. In real driving, the cars exceeded emissions standards "
+#~ "by a factor of up to 35."
+#~ msgstr ""
+#~ "A Volkswagen programou seus computadores com motor de carro para <a href="
+#~ "\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\"> "
+#~ "detectar os testes de emissões da Agência de Proteção Ambiental</a>, e
"
+#~ "funcionar incorretamente o resto do tempo. Na condução real, os carros "
+#~ "superaram os padrões de emissão em um fator de até 35."
+
+#~ msgid ""
+#~ "Using free software would not have stopped Volkswagen from programming it "
+#~ "this way, but would have made it harder to conceal, and given the users "
+#~ "the possibility of correcting the deception."
+#~ msgstr ""
+#~ "Usar o software livre não teria impedido a Volkswagen de programá-lo "
+#~ "dessa maneira, mas teria dificultado a ocultação e dado aos usuários a "
+#~ "possibilidade de corrigir o engano."
+
+#~ msgid ""
+#~ "Former executives of Volkswagen are being <a href=\"https://www."
+#~ "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-"
+#~ "face-10-years-in-prison\"> sued over this fraud</a>."
+#~ msgstr ""
+#~ "Ex-executivos da Volkswagen estão sendo <a
href=\"https://www.theguardian."
+#~ "com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+#~ "prison\"> processados por esta fraude</a>."
+
+#~ msgid ""
#~ "Google tracks the movements of Android phones, and sometimes <a href="
#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
#~ "tracking-police.html\"> saves the data for years</a>."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary.ru.po 28 Apr 2019 10:29:28 -0000 1.233
+++ proprietary.ru.po 8 May 2019 12:31:45 -0000 1.234
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 12:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -442,40 +460,6 @@
"ÑкономиÑеÑком оÑделе, как ÑÑо ÑбиваеÑ
ваÑе ÑабоÑее вÑемÑ, заÑÑавлÑÑ "
"ÑÑажаÑÑÑÑ Ñ Ð±ÐµÑконеÑнÑми ÑоединениÑми и
пÑеждевÑеменнÑми ÑбоÑми аппаÑаÑÑÑÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
-"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
-"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
-"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
-"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-"ÐÑвÑиÑ
ÑÑководиÑелей Volkswagen <a
href=\"https://www.theguardian.com/"
-"business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"
-"\"> оÑдали под ÑÑд за ÑÑо моÑенниÑеÑÑво</a>."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -555,6 +539,38 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Volkswagen programmed its car engine computers to <a href=\"https://www."
+#~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+#~ "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#~ "rest of the time. In real driving, the cars exceeded emissions standards "
+#~ "by a factor of up to 35."
+#~ msgstr ""
+#~ "РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
"
+#~ "авÑомобилей на <a
href=\"https://www.petri.com/volkswagen-used-software-"
+#~ "to-cheat-on-emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
"
+#~ "ÐгенÑÑÑвом по оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a>
СШÐ, и загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе "
+#~ "оÑÑалÑное вÑемÑ. ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали "
+#~ "ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
+
+#~ msgid ""
+#~ "Using free software would not have stopped Volkswagen from programming it "
+#~ "this way, but would have made it harder to conceal, and given the users "
+#~ "the possibility of correcting the deception."
+#~ msgstr ""
+#~ "ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑÐ²Ð°Ð³ÐµÐ½Ñ "
+#~ "запÑогÑаммиÑоваÑÑ ÐºÐ¾Ð¼Ð¿ÑÑÑÐµÑ Ñаким
обÑазом, но ÑÑо бÑло Ð±Ñ ÑÑÑднее ÑкÑÑÑÑ, "
+#~ "и Ñ Ð¿Ð¾Ð»ÑзоваÑелей бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ
иÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
+
+#~ msgid ""
+#~ "Former executives of Volkswagen are being <a href=\"https://www."
+#~ "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-"
+#~ "face-10-years-in-prison\"> sued over this fraud</a>."
+#~ msgstr ""
+#~ "ÐÑвÑиÑ
ÑÑководиÑелей Volkswagen <a
href=\"https://www.theguardian.com/"
+#~ "business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+#~ "prison\"> оÑдали под ÑÑд за ÑÑо
моÑенниÑеÑÑво</a>."
+
+#~ msgid ""
#~ "Google tracks the movements of Android phones, and sometimes <a href="
#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
#~ "tracking-police.html\"> saves the data for years</a>."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary.zh-tw-diff.html 27 Apr 2019 20:00:26 -0000 1.80
+++ proprietary.zh-tw-diff.html 8 May 2019 12:31:45 -0000 1.81
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
@@ -127,17 +127,17 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -257,22 +270,6 @@
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
-
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
-
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
- sued over this fraud</a>.</p>
- </li>
</ul></em></ins></span>
@@ -333,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 20:00:26 $
+$Date: 2019/05/08 12:31:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.zh-tw.po 27 Apr 2019 20:00:26 -0000 1.91
+++ proprietary.zh-tw.po 8 May 2019 12:31:45 -0000 1.92
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-27 19:56+0000\n"
+"POT-Creation-Date: 2019-05-08 12:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -430,29 +447,6 @@
"hardware failures."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Former executives of Volkswagen are being <a href=\"https://www.theguardian."
-"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
-"prison\"> sued over this fraud</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- pt-br.po 28 Apr 2019 18:30:50 -0000 1.106
+++ pt-br.po 8 May 2019 12:31:45 -0000 1.107
@@ -2400,6 +2400,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- ru.po 28 Apr 2019 10:59:20 -0000 1.176
+++ ru.po 8 May 2019 12:31:45 -0000 1.177
@@ -3258,6 +3258,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- zh-tw.po 27 Apr 2019 20:00:26 -0000 1.81
+++ zh-tw.po 8 May 2019 12:31:45 -0000 1.82
@@ -2290,6 +2290,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The FordPass Connect feature of some Ford vehicles has <a href=\"https://www."
+"myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
+"complete access to the internal car network</a>. It is constantly connected "
+"to the cellular phone network and sends Ford a lot of data, including car "
+"location. This feature operates even when the ignition key is removed, and "
+"users report that they can't disable it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"If you own one of these cars, have you succeeded in breaking the "
+"connectivity by disconnecting the cellular modem, or wrapping the antenna in "
+"aluminum foil?"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
"canyon/2019.html\"> offer the feature of a universal back door</a>."
msgstr ""
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/18
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/29