[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 10 May 2019 13:02:58 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/05/10 13:02:57
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.425&r2=1.426
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.272&r2=1.273
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.519&r2=1.520
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.86&r2=1.87
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- de.po 9 May 2019 16:00:36 -0000 1.86
+++ de.po 10 May 2019 17:02:54 -0000 1.87
@@ -7621,6 +7621,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- es.po 9 May 2019 16:00:39 -0000 1.114
+++ es.po 10 May 2019 17:02:54 -0000 1.115
@@ -6067,6 +6067,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- fr.po 9 May 2019 16:06:11 -0000 1.149
+++ fr.po 10 May 2019 17:02:54 -0000 1.150
@@ -6258,6 +6258,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- it.po 9 May 2019 16:00:39 -0000 1.86
+++ it.po 10 May 2019 17:02:55 -0000 1.87
@@ -7144,6 +7144,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- ja.po 9 May 2019 16:00:39 -0000 1.86
+++ ja.po 10 May 2019 17:02:55 -0000 1.87
@@ -6125,6 +6125,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-mobiles.de-diff.html 26 Apr 2019 12:00:38 -0000 1.53
+++ malware-mobiles.de-diff.html 10 May 2019 17:02:55 -0000 1.54
@@ -484,6 +484,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -852,75 +864,78 @@
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
- <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for <span
class="removed"><del><strong>tracking</strong></del></span>
- <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
- </dl>
- </li>
-
- <li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
- </li>
-
- <li id="M201606050">
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
- and <span class="removed"><del><strong>display ads.</dd>
+ <dd>Injects JavaScript code into HTML <span
class="removed"><del><strong>pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that the non-premium version of the app does
+ JavaScript injection for tracking and display ads.</dd>
</dl>
</li>
<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span> <span class="inserted"><ins><em>suggests you to
share the picture you take according to who is</em></ins></span>
- in <span class="removed"><del><strong>2015</a> found that 90%
of</strong></del></span> the <span class="removed"><del><strong>top-ranked
gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>pictures are
likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures</em></ins></span> are <span
class="removed"><del><strong>not in fact
+ but most of them are not in fact
<a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>private
anymore,
- even if</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them to the
service.</p></em></ins></span>
+ It</strong></del></span> <span class="inserted"><ins><em>pages,
and</em></ins></span> also uses <span class="inserted"><ins><em>roughly
+ five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
+ the <span class="removed"><del><strong>ugly word “monetize”.
A good replacement</strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection</em></ins></span> for <span class="removed"><del><strong>that word is
“exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
+ </dl></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A study found 234 Android apps that track users
by</strong></del></span>
- <span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in
stores</strong></del></span> or <span class="removed"><del><strong>played by TV
programs</a>.
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
</p>
</li>
<li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,</em></ins></span>
- it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>personal
data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
- advertisements.</p></em></ins></span>
+ <p>Faceapp appears to do</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by</strong></del></span>
<span class="inserted"><ins><em>data to China</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps</strong></del></span>
+ <li id="M201606050">
+ <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</em></ins></span> to <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>share the picture you take according to who
is</em></ins></span>
+ in the <span class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+<li>
+ <p>Pairs of Android apps can collude</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> <span
class="inserted"><ins><em>require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook</em></ins></span> users' <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
+ even if the user didn't “upload” them</em></ins></span> to
<span class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>the service.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201604250">
- <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal data
- to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ <li id="M201605310">
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In addition,
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
+ </li>
+
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
@@ -1035,45 +1050,45 @@
twisted ways that they present snooping as</em></ins></span> a <span
class="removed"><del><strong>server, where the <em>developer</em>
gets it all.</strong></del></span> <span class="inserted"><ins><em>way to
“serve”
users better</a>—never mind whether they want
that.</em></ins></span> This <span
class="removed"><del><strong>“service”</strong></del></span> is
<span class="removed"><del><strong>for suckers!</p>
-<p>The server surely has</strong></del></span> a <span
class="removed"><del><strong>“privacy policy,”</strong></del></span>
- <span class="inserted"><ins><em>typical example of the attitude of the
proprietary software industry
+<p>The server surely has</strong></del></span> a <span
class="removed"><del><strong>“privacy policy,” and surely it
+is worthless since nearly all</strong></del></span>
+ <span class="inserted"><ins><em>typical example</em></ins></span> of <span
class="removed"><del><strong>them are.</p></strong></del></span> <span
class="inserted"><ins><em>the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>surely it</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
- transmission</em></ins></span> is <span
class="removed"><del><strong>worthless since nearly all</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
- not wanted or requested by the user, clearly must constitute
spying</em></ins></span>
- of <span class="removed"><del><strong>them
are.</p></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs are
+ playing nearby</a>. Also on what</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that</em></ins></span> users <span class="removed"><del><strong>post on
various sites such as
+ Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% and
47%</strong></del></span>
<span class="inserted"><ins><em><li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found</em></ins></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs are
- playing nearby</a>. Also on what users post on various sites
such</strong></del></span> <span class="inserted"><ins><em>90% of the
top-ranked gratis proprietary
+ study in 2015</a> found that 90%</em></ins></span> of <span
class="removed"><del><strong>mobile applications, both
from</strong></del></span> <span class="inserted"><ins><em>the top-ranked
gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
- <p>The article confusingly describes gratis apps</em></ins></span>
as
- <span class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span>
- <span class="inserted"><ins><em>“free”, but most of them are
not in fact <a
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% and 47%
of mobile applications, both from</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>and iOS
respectively</strong></del></span> <span class="inserted"><ins><em>apps (but
not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
behavioral</strong></del></span>
@@ -1328,7 +1343,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-mobiles.de.po 26 Apr 2019 12:00:38 -0000 1.110
+++ malware-mobiles.de.po 10 May 2019 17:02:55 -0000 1.111
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -798,6 +798,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-mobiles.es.po 27 Apr 2019 11:54:39 -0000 1.123
+++ malware-mobiles.es.po 10 May 2019 17:02:55 -0000 1.124
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -687,6 +688,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-mobiles.fr.po 26 Apr 2019 17:26:14 -0000 1.147
+++ malware-mobiles.fr.po 10 May 2019 17:02:55 -0000 1.148
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-04-26 19:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -688,6 +689,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-mobiles.it-diff.html 26 Apr 2019 12:00:38 -0000 1.58
+++ malware-mobiles.it-diff.html 10 May 2019 17:02:55 -0000 1.59
@@ -299,7 +299,7 @@
<li>
<p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>Android has a universal back door</a>.
Nearly</em></ins></span>
- all <span class="removed"><del><strong>the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>models of mobile
phones have a <a href="#universal-back-door">
+ all <span class="removed"><del><strong>the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
<span class="inserted"><ins><em>models of mobile phones have a <a
href="#universal-back-door">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -308,8 +308,8 @@
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
- a back door</a> that provides remote access to the files
stored</em></ins></span> on <span
class="removed"><del><strong>what</strong></del></span>
- <span class="inserted"><ins><em>the device.</p>
+ a back door</a> that provides remote access to the files stored on
+ the device.</p>
</li>
</ul>
@@ -345,7 +345,7 @@
<li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to</em></ins></span> people <span class="removed"><del><strong>are
listening</strong></del></span> <span class="inserted"><ins><em>in the owner's
contact list</a>.</p>
+ photos to people in the owner's contact list</a>.</p>
</li>
<li id="M201704050">
@@ -360,10 +360,9 @@
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
- <p>This is in addition</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>the fact that
the car contains a cellular
- modem that tells big brother all the time where</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>is. If you own
- such a car, it would</em></ins></span> be <span
class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span
class="inserted"><ins><em>wise</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>disconnect the modem so as to turn
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
off the tracking.</p>
</li>
@@ -518,6 +517,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -675,8 +686,8 @@
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
+ of the 5,855 Android apps studied by researchers were found
to</em></ins></span> snoop
+ <span class="inserted"><ins><em>and collect information about its
users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
@@ -740,9 +751,9 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="inserted"><ins><em>the contrary, it
worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
+ discovering</em></ins></span> what <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
@@ -791,20 +802,24 @@
</li>
<li id="M201704190">
- <p>Users are suing Bose for <a
+ <p>Users</em></ins></span> are <span
class="removed"><del><strong>listening</strong></del></span> <span
class="inserted"><ins><em>suing Bose for <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
+ the app would record the names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>or
watching</a>. In addition,</strong></del></span>
+ <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
<p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ would that make</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should</em></ins></span> be
<span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>flat out
<a
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>serve them with
targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
<p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
@@ -840,13 +855,10 @@
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
+ <li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -880,393 +892,397 @@
<dt>HideMyAss</dt>
<dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn <span class="removed"><del><strong>them over to the UK
government if
- requested.</dd>
+ may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
-</li>
-
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-</li>
-
-<li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p>
- </li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal data
- to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude.</a></p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned to</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span>
- <span class="inserted"><ins><em>users. The stated
purpose</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>the JS injection</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>display
ads. Uses
- roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>user's
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly <span class="removed"><del><strong>5</strong></del></span> <span
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it
redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>Conditions”</strong></del></span>
<span class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers of this app have
confirmed</em></ins></span> that <span class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify</strong></del></span>
- the <span class="removed"><del><strong>information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>non-premium
version</em></ins></span> of <span class="removed"><del><strong>hiding it in an
obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information
in</strong></del></span> the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>app
does JavaScript injection for
- tracking the user and displaying ads.</dd>
- </dl></em></ins></span>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
+ <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for <span
class="removed"><del><strong>tracking</strong></del></span>
+ <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
+ </dl>
</li>
-<span class="removed"><del><strong><li>
- <p>Google Play (a component</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611150">
+ <li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>data to China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201606050">
- <p>Facebook's new Magic Photo app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
- and <span class="removed"><del><strong>location
tracking,</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>must
- disable Google Play itself</strong></del></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>who is
- in</em></ins></span> the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
-
+ and <span class="removed"><del><strong>display ads.</dd>
+ </dl>
</li>
+
<li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span> <span class="inserted"><ins><em>suggests you to
share the picture you take according to who is</em></ins></span>
+ in <span class="removed"><del><strong>2015</a> found that 90%
of</strong></del></span> the <span class="removed"><del><strong>top-ranked
gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>frame.</p>
- <p>This spyware feature seems to require online access
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The
app will give Verizon the same
- information about</strong></del></span>
- <span class="inserted"><ins><em>known-faces database, which
means</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
- they use its search engine.</p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span>
and <span class="inserted"><ins><em>face-recognition
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>pictures are
likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them
to</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures</em></ins></span> are <span
class="removed"><del><strong>not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>private
anymore,
+ even if</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them to the
service.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
+
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
<span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's</em></ins></span> app <span
class="inserted"><ins><em>listens all the time,</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
-user data</strong></del></span>
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
+ snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in
stores</strong></del></span> or <span class="removed"><del><strong>played by TV
programs</a>.
+ </p>
+</li>
<li>
-<p>A half-blind security critique of a tracking
app:</strong></del></span> <span class="inserted"><ins><em>or
watching</a>. In addition,</em></ins></span>
- it <span class="removed"><del><strong>found that <a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
-blatant flaws allowed anyone</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
- advertisements.</p>
- </li>
-
- <li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy</em></ins></span> on <span class="removed"><del><strong>a user's
personal data</a>.
-The critique fails entirely to express concern that the app sends the
-personal</strong></del></span> <span class="inserted"><ins><em>many sorts
of</em></ins></span> data <span class="removed"><del><strong>to a server,
where</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong><em>developer</em> gets it all.
-This “service” is for suckers!</p>
-
-<p>The server surely has a “privacy
policy,”</strong></del></span> <span
class="inserted"><ins><em>phone,</em></ins></span> and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>in server accounts,</em></ins></span>
- it
-<span class="removed"><del><strong>is worthless since nearly all
of</strong></del></span> <span class="inserted"><ins><em>can
alter</em></ins></span> them <span
class="removed"><del><strong>are.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ <p>Faceapp appears to do lots of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,</em></ins></span>
+ it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>personal
data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
+ <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal data
+ to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps</em></ins></span> that include <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"></em></ins></span>
+ <li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude.</a></p></strong></del></span>
<span class="inserted"><ins><em>include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>More than 73% and
47%</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
<span class="inserted"><ins><em><li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>mobile applications, both from Android and iOS
- respectively</strong></del></span> <span class="inserted"><ins><em>monitoring
- people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
+ <p>The natural extension of monitoring
+ people through “their” phones is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p></em></ins></span>
+ proprietary software to make sure they can't
“fool”</em></ins></span>
+ the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
+ <li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <span class="inserted"><ins><em><li id="M201511190">
- <p>“Cryptic</em></ins></span> communication,”
- unrelated to the app's functionality, was <a
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ found in</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not enough
+to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
- <p>The article should not have described these apps as
+ <p>The article should not</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
“free”—they are not free software. The clear way
to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is <span class="removed"><del><strong>that valid?
Software developers have no right</strong></del></span> <span
class="inserted"><ins><em>that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
- </li>
-
- <li id="M201510300">
- <p>More than 73% and 47% of mobile applications, from Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
- third parties.</p>
- </li>
-
- <li id="M201510050">
- <p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is</em></ins></span> that <span
class="removed"><del><strong>spell out</strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
+ analyze</em></ins></span> what <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent Google
+and</strong></del></span> <span class="inserted"><ins><em>doing or how.
“Analytics” tools
+ that snoop are just as wrong as any</em></ins></span> other <span
class="removed"><del><strong>companies from getting this personal information
in the first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>snooping.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510300">
+ <p>More than 73% and 47%</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>mobile applications, from Android and iOS
+ respectively</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
+ personal, behavioral</em></ins></span> and location <span
class="removed"><del><strong>tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>information</a></em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable</strong></del></span> <span class="inserted"><ins><em>their
users</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span>
+ <span class="inserted"><ins><em>third parties.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510050">
+ <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
- retrieve geo-location data from the GPS, take photographs, read
+ them to turn</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
and <span class="inserted"><ins><em>off, listen to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed</em></ins></span> to
- <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>disguise itself
+ read</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+</li>
+<li><p>The Meitu photo-editing
+app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+user data</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
+
+<li>
+<p>A half-blind security critique of a tracking
app:</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
<li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</em></ins></span> users <span class="inserted"><ins><em>submit to
increased snooping</a>, and some</em></ins></span> are <span
class="removed"><del><strong>doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>starting
- to realize</em></ins></span> that <span class="removed"><del><strong>snoop
are
- just as wrong as any other snooping.</p>
- </li>
-
- <li><p>Many proprietary apps for mobile devices report which
other
- apps</strong></del></span> <span class="inserted"><ins><em>it is
nasty.</p>
-
- <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>user has
- installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</em></ins></span> a way <span
class="removed"><del><strong>that at least</strong></del></span> <span
class="inserted"><ins><em>to “serve”
- users better</a>—never mind whether they want that.
This</em></ins></span> is <span class="removed"><del><strong>visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>a
- typical example of</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>attitude of the proprietary software industry
+ based on proprietary malware (DRM and snooping). In August
2015</em></ins></span> it <span class="removed"><del><strong>found
that</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+blatant flaws allowed anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>snoop on a user's personal data</a>.
+The critique fails entirely</strong></del></span> <span
class="inserted"><ins><em>increased snooping</a>, and some are
starting</em></ins></span>
+ to <span class="removed"><del><strong>express
concern</strong></del></span> <span
class="inserted"><ins><em>realize</em></ins></span> that <span
class="inserted"><ins><em>it is nasty.</p>
+
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>app sends the
+personal data to</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</em></ins></span> a <span
class="removed"><del><strong>server, where the <em>developer</em>
gets it all.</strong></del></span> <span class="inserted"><ins><em>way to
“serve”
+ users better</a>—never mind whether they want
that.</em></ins></span> This <span
class="removed"><del><strong>“service”</strong></del></span> is
<span class="removed"><del><strong>for suckers!</p>
+
+<p>The server surely has</strong></del></span> a <span
class="removed"><del><strong>“privacy policy,”</strong></del></span>
+ <span class="inserted"><ins><em>typical example of the attitude of the
proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span
class="removed"><del><strong><li><p>Portable</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones <span
class="inserted"><ins><em>come</em></ins></span> with <span
class="removed"><del><strong>GPS will</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201507030">
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they</em></ins></span> send <span
class="inserted"><ins><em>so much data that</em></ins></span> their <span
class="removed"><del><strong>GPS location on remote
- command and users cannot stop them: <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones to have
- GPS.)</p></strong></del></span>
- <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>surely it</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
+ transmission</em></ins></span> is <span
class="removed"><del><strong>worthless since nearly all</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
+ not wanted or requested by the user, clearly must constitute
spying</em></ins></span>
+ of <span class="removed"><del><strong>them
are.</p></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Cisco TNP
IP phones: <a
-
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
-
- <li><p>Spyware</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
<span class="inserted"><ins><em><li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study</em></ins></span> in <span class="removed"><del><strong>Android
phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall)
reports</strong></del></span> <span class="inserted"><ins><em>2015</a>
found</em></ins></span> that <span class="removed"><del><strong><a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span> <span
class="inserted"><ins><em>90% of</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary</em></ins></span>
- Android <span class="removed"><del><strong>phones
- and</strong></del></span> <span class="inserted"><ins><em>apps contained
recognizable tracking libraries. For the paid
+ study in 2015</a> found</em></ins></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs are
+ playing nearby</a>. Also on what users post on various sites
such</strong></del></span> <span class="inserted"><ins><em>90% of the
top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
- <p>The article confusingly describes gratis apps as
- “free”, but most of them are not</em></ins></span> in <span
class="removed"><del><strong>laptops</a>. (I suspect this means Windows
laptops.) Here is</strong></del></span> <span
class="inserted"><ins><em>fact</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>. It also uses the
+ <p>The article confusingly describes gratis apps</em></ins></span>
as
+ <span class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span>
+ <span class="inserted"><ins><em>“free”, but most of them are
not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Some Motorola phones
modify</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% and 47%
of mobile applications, both from</strong></del></span>
<span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>apps (but not</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Motorola.</a></p>
- </li>
-
- <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p></em></ins></span>
+ <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>and iOS
+ respectively</strong></del></span> <span class="inserted"><ins><em>apps (but
not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>location information</a> of
their users with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on the
average.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
<span class="inserted"><ins><em><li id="M201504060">
- <p>Widely</em></ins></span> used <a
+ <p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ QR-code scanner apps snoop on the user</a>. This is in
addition</em></ins></span> to
+ the <span class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>snooping done by
the phone company, and perhaps by the OS</em></ins></span> in
+ the <span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
- malware.</p>
- </li>
-<span class="removed"><del><strong></ul>
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>phone.</p>
-<h3 id="drm">Mobile DRM</h3>
-<ul></strong></del></span>
+ <p>Don't be distracted by the question of whether the app developers
+ get users</em></ins></span> to say
+ <span class="removed"><del><strong>“zero
price”</strong></del></span> <span class="inserted"><ins><em>“I
agree”. That</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
- <li <span
class="removed"><del><strong>id="android-apps-detect-rooting">
-<p>Google now allows Android</strong></del></span> <span
class="inserted"><ins><em>id="M201411260">
- <p>Many proprietary</em></ins></span> apps <span
class="removed"><del><strong>to detect whether a device</strong></del></span>
<span class="inserted"><ins><em>for mobile devices
- report which other apps the user</em></ins></span> has <span
class="removed"><del><strong>been
-rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
-if so</a>.</p>
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>no excuse</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span>
+ <span class="inserted"><ins><em>malware.</p>
+ </li>
-<p>Update: Google <i>intentionally</i></strong></del></span>
<span class="inserted"><ins><em>installed.</em></ins></span> <a <span
class="removed"><del><strong>href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">
-changed Android so</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</em></ins></span> that <span
class="removed"><del><strong>apps can detect rooted
devices</strong></del></span> <span class="inserted"><ins><em>at least is
visible</em></ins></span> and <span
class="removed"><del><strong>refuse</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
- as bad as what the others do.</p>
+ <li id="M201411260">
+ <p>Many proprietary apps for mobile devices
+ report which other apps</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
+
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="removed"><del><strong>that valid? Software developers
have no right to
+ analyze what users are</strong></del></span> doing <span
class="removed"><del><strong>or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>this in a
way</em></ins></span> that <span class="removed"><del><strong>snoop are
+ just</strong></del></span> <span class="inserted"><ins><em>at least is
visible and optional</a>. Not</em></ins></span>
+ as <span class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> as <span
class="inserted"><ins><em>what the others do.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to
-<span class="removed"><del><strong>run</strong></del></span> <span
class="inserted"><ins><em>any file</em></ins></span> on <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the system.</p></em></ins></span>
+ Samsung's back door</a> provides access to</em></ins></span> any
<span class="inserted"><ins><em>file on the system.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li
id="M201401150.1"></em></ins></span>
- <p>The <span class="removed"><del><strong>iPhone 7 contains DRM
specifically designed</strong></del></span> <span
class="inserted"><ins><em>Simeji keyboard is a smartphone version of Baidu's
<a
+ <li id="M201401150.1">
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="inserted"><ins><em>restrict the
- use of data on the user's computer, but it does surveillance
too:</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></em></ins></span>
- it <span class="removed"><del><strong>if an “unauthorized”
repair shop fixes it</a>.
- “Unauthorized” essentially means anyone besides
Apple.</p></strong></del></span> <span class="inserted"><ins><em>tries to
get the user's list of other people's phone
- numbers</a>.</p>
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of</em></ins></span> other <span
class="removed"><del><strong>snooping.</p></strong></del></span> <span
class="inserted"><ins><em>people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060"></em></ins></span>
- <p>The <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>Brightest Flashlight
app <a
+ <span class="removed"><del><strong><li><p>Many proprietary
apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
+ <p>The Brightest Flashlight app <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
+ sends user data, including geolocation,</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which</strong></del></span>
<span class="inserted"><ins><em>use by companies</a>.</p>
- <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>term
“lock”</strong></del></span> <span class="inserted"><ins><em>user to
- approve sending personal data</em></ins></span> to <span
class="removed"><del><strong>describe</strong></del></span> the <span
class="removed"><del><strong>DRM,</strong></del></span> <span
class="inserted"><ins><em>app developer</em></ins></span> but <span
class="removed"><del><strong>we prefer</strong></del></span> <span
class="inserted"><ins><em>did not ask
- about sending it</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>term <a
- href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
- digital handcuffs</a>.</p></strong></del></span> <span
class="inserted"><ins><em>weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to</em></ins></span> other
+ <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>companies. This shows</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>weakness of</em></ins></span>
+ the <span class="removed"><del><strong>others
do.</p></strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would
not.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Android</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Portable</strong></del></span>
<span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.android.com/reference/android/drm/package-summary.html">contains
- facilities specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
- to <span class="removed"><del><strong>support
DRM</a>.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
- </li>
-
- <li id="M201212100">
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>Portable</em></ins></span> phones with GPS <span
class="inserted"><ins><em><a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"></em></ins></span>
+ will send their GPS location on remote
+ <span class="removed"><del><strong>command</strong></del></span> <span
class="inserted"><ins><em>command,</em></ins></span> and users cannot stop
<span class="removed"><del><strong>them: <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</em></ins></span> (The US
says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Spyware in Cisco TNP
IP phones: <a
+
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>.</p></li>
+
+ <li><p>Spyware in Android phones (and Windows? laptops): The
Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and in laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li id="M201111170">
- <p>Some manufacturers add a <a
+ <li><p>Some Motorola phones modify Android
to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Some</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some</em></ins></span> manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
+ </li>
+
+ <li><p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question of whether the app developers
get
+ users to say “I agree”. That is no excuse for malware.</p>
+ </li>
+</ul>
+
+<h3 id="drm">Mobile DRM</h3>
+<ul>
+
+<li id="android-apps-detect-rooting">
+<p>Google now allows Android apps to detect whether a device has been
+rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
+if so</a>.</p>
+
+<p>Update: Google <i>intentionally</i> <a
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">
+changed Android so that apps can detect rooted devices and refuse to
+run on them</a>.</p>
+</li>
+
+ <li>
+ <p>The iPhone 7 contains DRM specifically designed to <a
+
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+ brick it if an “unauthorized” repair shop fixes it</a>.
+ “Unauthorized” essentially means anyone besides Apple.</p>
+
+ <p>The article uses the term “lock” to describe the DRM,
+ but we prefer to use the term <a
+ href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
+ digital handcuffs</a>.</p>
+ </li>
+
+ <li><p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">contains
+ facilities specifically to support
DRM</a>.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
</li>
</ul>
@@ -1361,7 +1377,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-mobiles.it.po 26 Apr 2019 12:00:38 -0000 1.110
+++ malware-mobiles.it.po 10 May 2019 17:02:55 -0000 1.111
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -767,6 +767,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-mobiles.ja-diff.html 26 Apr 2019 12:00:38 -0000 1.72
+++ malware-mobiles.ja-diff.html 10 May 2019 17:02:55 -0000 1.73
@@ -484,6 +484,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -1204,7 +1216,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- malware-mobiles.ja.po 26 Apr 2019 12:00:38 -0000 1.98
+++ malware-mobiles.ja.po 10 May 2019 17:02:55 -0000 1.99
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -636,6 +636,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-mobiles.pot 26 Apr 2019 12:00:38 -0000 1.76
+++ malware-mobiles.pot 10 May 2019 17:02:55 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -467,6 +467,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a "
+"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
+"requirement to run a proprietary phone app</a> to be allowed into the event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a "
+"href=\"https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
"
+"near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a "
"href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\">
"
"available to employers and insurance companies</a>. Even though the data is "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- malware-mobiles.ru.po 26 Apr 2019 12:32:44 -0000 1.181
+++ malware-mobiles.ru.po 10 May 2019 17:02:55 -0000 1.182
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -678,6 +679,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- nl.po 9 May 2019 16:00:39 -0000 1.86
+++ nl.po 10 May 2019 17:02:55 -0000 1.87
@@ -4906,6 +4906,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- pl.po 9 May 2019 16:00:39 -0000 1.86
+++ pl.po 10 May 2019 17:02:55 -0000 1.87
@@ -4342,6 +4342,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- pot 9 May 2019 16:00:40 -0000 1.86
+++ pot 10 May 2019 17:02:55 -0000 1.87
@@ -4165,6 +4165,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-back-doors.de-diff.html 8 May 2019 12:31:42 -0000 1.25
+++ proprietary-back-doors.de-diff.html 10 May 2019 17:02:55 -0000 1.26
@@ -136,6 +136,18 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -186,29 +198,26 @@
<span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft was forcing them</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door</em></ins></span> to <span class="removed"><del><strong>replace
Windows 7 and 8</strong></del></span> <span class="inserted"><ins><em>remotely
unlock an Android device</a>, unless its disk
- is encrypted (possible since Android 5.0 Lollipop, but still not
- quite the default).</p>
- </li>
-
- <li id="M201511194">
- <p>Caterpillar vehicles come</em></ins></span> with <span
class="removed"><del><strong>all-spying
+ back door</em></ins></span> to <span class="removed"><del><strong>replace
Windows 7 and 8 with all-spying
Windows 10</a>.</p>
- <p>Microsoft was in fact</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
attacking computers that run Windows 7 and 8</a>, switching on a
flag
that said whether to “upgrade” to Windows 10 when users
had turned it off.</p>
<p>Later on, Microsoft published instructions on <a
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows
10</a>.</p>
- <p>This seems to involve use of a back door in Windows 7 and
8.</p>
+ how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>remotely unlock an Android device</a>, unless
its disk
+ is encrypted (possible since Android 5.0 Lollipop, but still not
+ quite</em></ins></span> the <span class="removed"><del><strong>downgrade
to Windows 10</a>.</p>
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p></strong></del></span> <span
class="inserted"><ins><em>default).</p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511194"></em></ins></span>
<p>Caterpillar vehicles come with <a
-
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"></em></ins></span>
+
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
a back door to shutoff the engine</a> remotely.</p>
</li>
@@ -356,10 +365,9 @@
<p> In addition to its</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
Google</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
- door</a>, Windows 8</em></ins></span> has a back door <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>for <a
-
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
- remotely <span class="removed"><del><strong>delete apps.</a> (It
was in a
- program called GTalkService, which seems since
then</strong></del></span> <span class="inserted"><ins><em>deleting
apps</a>.</p>
+ door</a>, Windows 8 has a back door for <a
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
@@ -371,8 +379,8 @@
<li id="M201103070">
<p>In Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps</a>. (It was in a
- program called GTalkService, which seems since then</em></ins></span> to
have been
+ Google</em></ins></span> has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It was in a
+ program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
<p>Google can also <a
@@ -778,7 +786,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 12:31:42 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-back-doors.de.po 8 May 2019 12:31:42 -0000 1.124
+++ proprietary-back-doors.de.po 10 May 2019 17:02:55 -0000 1.125
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -237,6 +237,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a href=\"https://www.theverge.com/platform/"
"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
"change\"> back door for remotely changing “user” settings</a>."
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-back-doors.es.po 9 May 2019 10:08:40 -0000 1.8
+++ proprietary-back-doors.es.po 10 May 2019 17:02:55 -0000 1.9
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-05-09 11:40+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -190,6 +191,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a href=\"https://www.theverge.com/platform/"
"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
"change\"> back door for remotely changing “user” settings</a>."
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-back-doors.fr.po 8 May 2019 16:35:29 -0000 1.128
+++ proprietary-back-doors.fr.po 10 May 2019 17:02:55 -0000 1.129
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-05-08 18:16+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -190,6 +191,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a href=\"https://www.theverge.com/platform/"
"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
"change\"> back door for remotely changing “user” settings</a>."
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-back-doors.it-diff.html 8 May 2019 12:31:42 -0000 1.52
+++ proprietary-back-doors.it-diff.html 10 May 2019 17:02:55 -0000 1.53
@@ -128,94 +128,107 @@
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>come</strong></del></span> as <span
class="inserted"><ins><em>much as Apple claims</a>.</p>
+ not <span class="removed"><del><strong>come</strong></del></span> as <span
class="removed"><del><strong>a surprise. Nonfree software for
+ encryption is never trustworthy.</p></strong></del></span>
<span class="inserted"><ins><em>much as Apple
claims</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>A pregnancy test
controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+
+<h3 id='alter-data'>Altering user's</em></ins></span> data <span
class="removed"><del><strong>in the phone, and in server accounts, it can
+ alter them too</a>.</p>
+ </li>
-<h3 id='alter-data'>Altering user's data or settings</h3>
+ <li>
+ <p>Xiaomi phones come with</strong></del></span> <span
class="inserted"><ins><em>or settings</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal back door in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>application processor, for
+ Xiaomi's use</a>.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
+
+ <p>This <span class="inserted"><ins><em>app</em></ins></span> is
<span class="removed"><del><strong>separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor</strong></del></span>
<span class="inserted"><ins><em>a spyware</em></ins></span> that <span
class="removed"><del><strong>the local
+ phone company</strong></del></span> can <span
class="removed"><del><strong>use</a>.</p>
+ </li>
+
+ <li><p>Capcom's Street Fighter V update</strong></del></span>
<span class="inserted"><ins><em>snoop on a lot of
+ sensitive data, including user's location and contact list, and
has</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201809140">
- <p>Android has</em></ins></span> a <span
class="removed"><del><strong>surprise. Nonfree software</strong></del></span>
<span class="inserted"><ins><em><a
+ <p>Android has</em></ins></span> a <span
class="removed"><del><strong>driver that can</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
- back door</em></ins></span> for
- <span class="removed"><del><strong>encryption is never
trustworthy.</p></strong></del></span> <span
class="inserted"><ins><em>remotely changing “user”
settings</a>.</p>
+ back door for remotely changing “user”
settings</a>.</p>
- <p>The article suggests it might be a universal back door, but this
+ <p>The article suggests it might</em></ins></span> be <span
class="removed"><del><strong>used as a backdoor by any application
+ installed on</strong></del></span> a <span
class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>universal back door, but this
isn't clear.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>A pregnancy
test</strong></del></span>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
<span class="inserted"><ins><em><li id="M201607284">
- <p>The Dropbox app for Macintosh <a
-
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
- takes control of user interface items after luring the user into
- entering an admin password</a>.</p>
+ <p>The</em></ins></span> Dropbox app for Macintosh <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
+ takes</em></ins></span> control of <span class="removed"><del><strong>the
machine by repeatedly nagging</strong></del></span> <span
class="inserted"><ins><em>user interface items after luring</em></ins></span>
the user
+ <span class="removed"><del><strong>for</strong></del></span> <span
class="inserted"><ins><em>into
+ entering</em></ins></span> an <span
class="removed"><del><strong>admini</strong></del></span> <span
class="inserted"><ins><em>admin</em></ins></span> password</a>.</p>
</li>
- <li id="M201604250">
- <p>A pregnancy test</em></ins></span> controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
+ <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
- universal</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201512074">
+ <li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a</em></ins></span> back door <span
class="removed"><del><strong>in the application
processor,</strong></del></span> for
- <span class="removed"><del><strong>Xiaomi's use</a>.</p>
-
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door</strong></del></span> <span
class="inserted"><ins><em>changing settings</em></ins></span> in <span
class="removed"><del><strong>the modem processor that the local
- phone company can use</a>.</p>
- </li>
-
- <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
- a driver that can be used as</strong></del></span> a <span
class="removed"><del><strong>backdoor by any application
- installed on</strong></del></span>
- <span class="inserted"><ins><em>dlink of an eye.</p>
+ Some D-Link routers</a> have a</em></ins></span> back door <span
class="inserted"><ins><em>for changing settings</em></ins></span> in <span
class="removed"><del><strong>portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span class="inserted"><ins><em>a
+ dlink</em></ins></span> of <span class="removed"><del><strong>this
problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router has</em></ins></span> a <span class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>back door</a>.</p>
+ router has a back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
routers have back doors</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Dropbox app for
Macintosh</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft</strong></del></span>
<span class="inserted"><ins><em><li id="M201511244">
- <p>Google has long had</em></ins></span> <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
- total control of the machine by repeatedly nagging the user
- for</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door to remotely unlock</em></ins></span> an <span
class="removed"><del><strong>admini
password</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Android device</a>, unless its disk
- is encrypted (possible since Android 5.0 Lollipop, but still not
- quite the default).</p></em></ins></span>
+ <p>Google</em></ins></span> has <span
class="removed"><del><strong>already backdoored</strong></del></span> <span
class="inserted"><ins><em>long had <a
+
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door to remotely unlock an Android device</a>,
unless</em></ins></span> its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
+
+ <li><p>Modern</strong></del></span>
+ <span class="inserted"><ins><em>is encrypted (possible since Android 5.0
Lollipop, but still not
+ quite the default).</p>
</li>
- <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201511194">
+ <li id="M201511194">
<p>Caterpillar vehicles come with <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
- a</em></ins></span> back door <span class="removed"><del><strong>in
portable phones <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
- employed</strong></del></span> to <span
class="removed"><del><strong>listen through their
microphones</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>shutoff the engine</a>
remotely.</p></em></ins></span>
+ a back door to shutoff the engine</a> remotely.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft has already backdoored its disk
encryption</a>.</p></li>
-
- <li><p>Modern</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509160">
+ <li id="M201509160">
<p>Modern</em></ins></span> gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
@@ -251,122 +264,39 @@
<span class="inserted"><ins><em><li id="M201210220">
<p id="swindle-eraser">The Amazon
- Kindle-Swindle</em></ins></span> has a back door that <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
- “upload files” as well as forcibly install
- apps</a>.</p>
- <p>It is used by 14,000 Android applications.</p>
- </li>
-
-<li><p>ARRIS cable modem</strong></del></span> has <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in</strong></del></span>
+ Kindle-Swindle</em></ins></span> has a back door that <span
class="inserted"><ins><em>has been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
+ “upload</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
+ remotely erase books</a>. One of the books erased was
<cite>1984</cite>, by George Orwell.</p>
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a>
- remotely.</p>
- </li>
-<li><p>
-Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local back door for 4 years</a>.
-</p></li>
-
-<li><p>Users reported that <a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was in fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying
it
+ <p>Amazon responded to criticism by saying it
would delete books only following orders from the
- state. However,</em></ins></span> that <span
class="removed"><del><strong>said whether to “upgrade” to Windows
10 when users
- had turned</strong></del></span> <span class="inserted"><ins><em>policy
didn't last. In 2012</em></ins></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions
on</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows 10</a>.</p>
-
- <p>This seems to involve use of</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped</em></ins></span> a <span class="removed"><del><strong>back door in
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's
Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8.</p>
-</li>
-
-<li>
-<p>Most mobile phones have a universal back door, which has been used to
-<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has a universal back door</a>. Nearly all
-models of mobile phones</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
+ state. However, that policy didn't last. In 2012 it <a
+
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers</em></ins></span> have <span
class="removed"><del><strong>a universal</strong></del></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know, and we have no way</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
-by Coolpad.
-</p>
-</li>
-
-<li>
-<p>Microsoft Windows has a universal back door through which
-<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p>
-<p>In Windows 10, the universal back door</strong></del></span> <span
class="inserted"><ins><em>find out. There</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
-“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
-</p>
-</li>
-
-<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>potential back
-door capabilities of the TPM 2.0 chip</a>.</p>
-</li>
-
-<li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
- <span class="inserted"><ins><em>assume</em></ins></span> that <span
class="removed"><del><strong>allows Apple to remotely delete apps</a>
which Apple considers
-“inappropriate”. Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
+ <p>Do other ebook readers have back doors in their nonfree software?
We
+ don't know, and we have no way to find out. There is no reason to
+ assume that they don't.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201011220"></em></ins></span>
+ <li id="M201011220">
<p>The iPhone has a back door for <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
- enabling it without <span class="removed"><del><strong>understanding.
-</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
+ enabling it without understanding.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Apple can, and regularly does,</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
<li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
back door that can make it cease to function</a>.</p>
<p>The article is full of confusions, errors and biases that we have
@@ -375,15 +305,13 @@
<ul>
<li>Getting a patent does not “enable” a company to do
any particular thing in its products. What it does enable the company
- to do is sue other companies if they do</em></ins></span> some <span
class="removed"><del><strong>data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>particular thing in
+ to do is sue other companies if they do some particular thing in
their products.</li>
<li>A company's policies about when to attack users through a back
- door are beside</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>point. Inserting the back door is wrong in the
+ door are beside the point. Inserting the back door is wrong in the
first place, and using the back door is always wrong too. No software
- developer should</em></ins></span> have <span
class="removed"><del><strong>improved</strong></del></span> <span
class="inserted"><ins><em>that power over users.</li>
+ developer should have that power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
@@ -399,109 +327,155 @@
generalization is a separate absurdity. It's like calling the cops
because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even</em></ins></span> with <span
class="inserted"><ins><em>a jackhammer, because it is an
+ to the boundary line, not even with a jackhammer, because it is an
abstraction and can't be affected by physical action.</p></li>
</ul>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
<p>Baidu's proprietary Android library, Moplus, has a back door that
<a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
+ can “upload</em></ins></span> files” as well as forcibly
install
apps</a>.</p>
- <p>It is used by 14,000 Android
applications.</p></em></ins></span>
+ <p>It is used by 14,000 Android applications.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
+<span class="removed"><del><strong><li><p>ARRIS cable modem has a
+ <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p>
+</li>
+ <li><p>Caterpillar vehicles come with
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
<span class="inserted"><ins><em><li id="M201112080">
- <p> In addition to its <a href="#windows-update">universal back
- door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>also</strong></del></span> has a back door for
<span class="inserted"><ins><em><a
-
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
- remotely deleting <span class="removed"><del><strong>apps</a>.
-</p>
+ <p> In addition</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a>
+ remotely.</p>
+ </li>
+<li><p>
+Mac OS X had an</strong></del></span> <span
class="inserted"><ins><em>its</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
+ door</a>, Windows 8 has a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
+</p></li>
-<p>
-You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
+<li><p>Users reported that</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ remotely deleting apps</a>.</p>
- <p>You</em></ins></span> might well decide to let a security service
that you trust
- remotely <em>deactivate</em> programs that it considers
malicious.
+ <p>You might well decide</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching
on</strong></del></span> <span class="inserted"><ins><em>let</em></ins></span>
a <span class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>security service that you trust
+ remotely <em>deactivate</em> programs</em></ins></span> that
<span class="removed"><del><strong>said whether to “upgrade” to
Windows 10 when users
+ had turned</strong></del></span> it <span
class="removed"><del><strong>off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>considers malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
- should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
-</p>
+ should have</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>right</em></ins></span> to <span
class="removed"><del><strong>Windows 10</a>.</p>
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p></strong></del></span>
- <span class="inserted"><ins><em>way.</p></em></ins></span>
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span
class="removed"><del><strong>involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>trust</em></ins></span> in <span
class="removed"><del><strong>Windows 7 and 8.</p></strong></del></span>
<span class="inserted"><ins><em>this
+ way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Most mobile phones have a universal back door, which has been used
to</strong></del></span>
- <span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
- <p>In Android, <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
- Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
- program called <span class="removed"><del><strong>GTalkService).
+ <span class="inserted"><ins><em><li id="M201103070">
+ <p>In Android,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
</p>
+</li>
-<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
- merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
+<li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version of Android</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
+ Google</em></ins></span> has a <span
class="removed"><del><strong>universal back door</a>. Nearly all
+models of mobile phones have a universal</strong></del></span> back door <span
class="inserted"><ins><em>to remotely delete apps</a>. (It
was</em></ins></span> in <span class="removed"><del><strong>the modem chip. So
+why did Coolpad bother</strong></del></span> <span class="inserted"><ins><em>a
+ program called GTalkService, which seems since then</em></ins></span> to
<span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>have been
+ merged into Google Play.)</p>
- <p>Google</em></ins></span> can also <a
+ <p>Google can also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
-seems, since</strong></del></span> <span
class="inserted"><ins><em>GTalkService. This is
- not equivalent to a universal back door, but permits various dirty
+ forcibly and remotely install apps</a> through GTalkService.
This</em></ins></span> is <span class="removed"><del><strong>controlled
+by Coolpad.
+</p>
+</li>
+
+<li>
+<p>Microsoft Windows has</strong></del></span>
+ <span class="inserted"><ins><em>not equivalent to</em></ins></span> a
universal back <span class="removed"><del><strong>door through which
+<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on the users</a>.
+</p>
+<p>More information on when
+<a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"></strong></del></span>
<span class="inserted"><ins><em>door, but permits various dirty
tricks.</p>
- <p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point is</em></ins></span> that <span
class="removed"><del><strong>article,</strong></del></span> <span
class="inserted"><ins><em>nobody should have such power,
- which could also be used maliciously. You might well
decide</em></ins></span> to
- <span class="inserted"><ins><em>let a security service remotely
<em>deactivate</em> programs that
- it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should</em></ins></span>
have <span class="removed"><del><strong>been merged into Google
Play).</strong></del></span> <span class="inserted"><ins><em>the right to decide
- who (if anyone) to trust in this way.</p>
+ <p>Although Google's <em>exercise</em>
of</em></ins></span> this <span class="removed"><del><strong>was used</a>.
+</p>
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>power has not been
+ malicious so far,</em></ins></span> the <span
class="removed"><del><strong>universal back door</strong></del></span> <span
class="inserted"><ins><em>point is that nobody should have such power,
+ which could also be used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+and immediately imposed</a>.
+</p>
+</li>
+
+<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>excuse for allowing it</em></ins></span> to <span
class="removed"><del><strong>potential back
+door capabilities of</strong></del></span>
+ <span
class="inserted"><ins><em><em>delete</em></em></ins></span> the
<span class="removed"><del><strong>TPM 2.0
chip</a>.</p></strong></del></span> <span
class="inserted"><ins><em>programs, and you should have the right to decide
+ who (if anyone) to trust in this way.</p></em></ins></span>
</li>
- <li id="M200808110">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have
- this power because of course we can trust Apple.</p>
+ “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+ this power because of course we can trust <span
class="removed"><del><strong>Apple.
+</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li></strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
+ <li id="M201902011"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="inserted"><ins><em><a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is
constantly
connected to the cellular phone network and sends Ford a lot of data,
- including car location.</em></ins></span> This <span
class="inserted"><ins><em>feature operates even when the ignition
- key</em></ins></span> is <span class="inserted"><ins><em>removed, and
users report that they can't disable it.</p>
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
@@ -511,7 +485,7 @@
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ offer the feature of</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
<p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
@@ -519,14 +493,18 @@
</li>
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ listening device,</em></ins></span> remote <span
class="removed"><del><strong>wipe</a>. It's not always enabled, but
users are led into enabling</strong></del></span> <span
class="inserted"><ins><em>changes to the code could surely
convert</em></ins></span> it <span class="removed"><del><strong>without
understanding.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>into one.</p></em></ins></span>
</li>
- <li id="M201711010">
+<span class="removed"><del><strong><li>
+ <p>Apple can,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
with a universal back door, and tethered to a server that requires
@@ -535,61 +513,93 @@
<li id="M201709090.1">
<p>Tesla used software to limit the part of the battery
- that was available to customers in some cars, and <a
-
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
+ that was available to customers in some cars,</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
this limit.</p>
- <p>While remotely allowing car “owners” to use the
- whole battery capacity did</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>do them any harm, the same back
- door would permit Tesla (perhaps under the command of some
- government)</em></ins></span> to <span class="inserted"><ins><em>remotely
order the car to use none of its battery. Or
+ <p>While</em></ins></span> remotely <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>allowing car “owners” to use the
+ whole battery capacity did not do them any harm, the same back
+ door would permit Tesla (perhaps under the command of</em></ins></span>
some <span class="removed"><del><strong>data from iPhones
for</strong></del></span>
+ <span class="inserted"><ins><em>government) to remotely
order</em></ins></span> the <span class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may</strong></del></span> <span class="inserted"><ins><em>car
to use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
<li id="M201702060.1">
<p>Vizio “smart” TVs <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
- have a universal back door</a>.</p>
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"></em></ins></span>
+ have <span class="removed"><del><strong>improved</strong></del></span>
<span class="inserted"><ins><em>a universal back door</a>.</p>
</li>
<li id="M201609130">
- <p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ <p>Xiaomi phones come</em></ins></span> with <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
a universal back door in the application processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ <p>This is separate from</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
universal back door in the modem processor that the local phone
- company can use</a>.</p>
+ company can use</a>.</p></em></ins></span>
</li>
- <li id="M201608171">
- <p id="windows-update">Microsoft
- Windows has a universal back door through which <a
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201608171">
+ <p id="windows-update">Microsoft</em></ins></span>
+ Windows <span class="removed"><del><strong>8 also</strong></del></span>
has a <span class="inserted"><ins><em>universal</em></ins></span> back door
<span class="removed"><del><strong>for remotely deleting apps</a>.
+</p>
+
+<p>
+You might well decide to let a security service that you trust
+remotely <em>deactivate</em> programs that it considers malicious.
+But there is no excuse for <em>deleting</em></strong></del></span>
<span class="inserted"><ins><em>through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
- any change whatsoever can be imposed on the users</a>.</p>
+ any change whatsoever can be imposed on</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
<p>This was <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and it seems
- that Microsoft used the same method to push the <a
+ reported in 2007</a> for XP</em></ins></span> and <span
class="removed"><del><strong>you
+should have</strong></del></span> <span class="inserted"><ins><em>Vista, and
it seems
+ that Microsoft used</em></ins></span> the <span
class="removed"><del><strong>right to decide who (if anyone) to trust in this
way.
+</p>
+
+<p>
+As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>same method</em></ins></span> to <span
class="removed"><del><strong>clean your computer of
malware,</strong></del></span> <span
class="inserted"><ins><em>push</em></ins></span> the <span
class="removed"><del><strong>first software</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/malware-microsoft.html#windows10-forcing">
- Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
+ Windows 10 downgrade</a></em></ins></span> to <span
class="removed"><del><strong>delete is</strong></del></span> <span
class="inserted"><ins><em>computers running</em></ins></span> Windows <span
class="removed"><del><strong>or iOS.
+</p>
+</li>
- <p>In Windows 10, the universal back door
- is no longer hidden; all “upgrades” will be <a
-
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
- forcibly and immediately imposed</a>.</p>
+<li></strong></del></span> <span class="inserted"><ins><em>7 and
8.</p></em></ins></span>
+
+ <p>In <span class="removed"><del><strong>Android,
+<a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+Google has a</strong></del></span> <span class="inserted"><ins><em>Windows 10,
the universal</em></ins></span> back door <span class="removed"><del><strong>to
remotely delete apps.</a> (It</strong></del></span>
+ is <span class="removed"><del><strong>in a program
+called GTalkService).
+</p>
+
+<p>
+Google can also</strong></del></span> <span class="inserted"><ins><em>no
longer hidden; all “upgrades” will be</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"></em></ins></span>
+ forcibly and <span class="removed"><del><strong>remotely install
apps</a> through GTalkService (which
+seems, since that article,</strong></del></span> <span
class="inserted"><ins><em>immediately imposed</a>.</p>
</li>
<li id="M201606060">
- <p>The Amazon Echo appears to have a universal back door, since <a
+ <p>The Amazon Echo appears</em></ins></span> to have <span
class="removed"><del><strong>been merged into Google Play).
+This is not equivalent</strong></del></span> <span class="inserted"><ins><em>a
universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
it installs “updates” automatically</a>.</p>
<p>We have found nothing explicitly documenting the lack of any way
- to disable remote changes to the software, so we are not completely
+ to disable remote changes</em></ins></span> to <span
class="inserted"><ins><em>the software, so we are not completely
sure there isn't one, but this seems pretty clear.</p>
</li>
@@ -842,7 +852,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 12:31:42 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-back-doors.it.po 8 May 2019 12:31:42 -0000 1.117
+++ proprietary-back-doors.it.po 10 May 2019 17:02:55 -0000 1.118
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -211,6 +211,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a href=\"https://www.theverge.com/platform/"
"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
"change\"> back door for remotely changing “user” settings</a>."
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-back-doors.ja-diff.html 8 May 2019 12:31:42 -0000 1.48
+++ proprietary-back-doors.ja-diff.html 10 May 2019 17:02:55 -0000 1.49
@@ -142,6 +142,18 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -228,76 +240,73 @@
<span class="inserted"><ins><em><li id="M201210220">
<p id="swindle-eraser">The Amazon
- Kindle-Swindle</em></ins></span> has a back door that <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
+ Kindle-Swindle</em></ins></span> has a back door that <span
class="inserted"><ins><em>has been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
“upload files” as well as forcibly install
apps</a>.</p>
- <p>It is used by 14,000 Android applications.</p>
- </li>
-
-<li><p>ARRIS cable modem</strong></del></span> has <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in</strong></del></span>
+ <p>It is used</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
- <cite>1984</cite>, by George Orwell.</p>
-
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it
- would delete books only following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
- remotely.</p>
+ remotely erase books</a>. One of the books erased was
+ <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android applications.</p>
</li>
-<li><p>
-Mac OS X had an</strong></del></span>
- <span class="inserted"><ins><em>state. However, that policy didn't last.
In 2012 it</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local</strong></del></span>
+
+<li><p>ARRIS cable modem has a</strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
+
+ <p>Amazon responded to criticism by saying it
+ would delete books only following orders from the
+ state. However, that policy didn't last. In 2012 it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have back doors in their nonfree software?
We
+ <p>Do other ebook readers have back doors</em></ins></span> in <span
class="removed"><del><strong>the
backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
don't know, and we have no way to find out. There is no reason to
- assume that they don't.</p>
+ assume that they don't.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Caterpillar vehicles
come with</strong></del></span>
- <li id="M201011220">
- <p>The iPhone has a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
-</p></li>
-
-<li><p>Users reported that</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was in fact</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201011220">
+ <p>The iPhone has a back door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
+ remotely.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p>
+ enabling it without understanding.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong><li><p>
+Mac OS X had an</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
<li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
- back door</em></ins></span> that <span class="removed"><del><strong>run
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it
cease to function</a>.</p>
-
- <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8</a>, switching on a
flag</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we have
- an obligation</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>expose, given that we are making a
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
- had turned it off.</p>
+ <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
+ back door <span class="removed"><del><strong>for 4 years</a>.
+</p></li>
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how</strong></del></span> <span class="inserted"><ins><em>them.</p>
+<li><p>Users reported</strong></del></span> that <span
class="removed"><del><strong><a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span> <span
class="inserted"><ins><em>can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
+
+ <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>we have
+ an obligation to expose, given</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we are making a link</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>them.</p>
<ul>
- <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>permanently
reject</strong></del></span> <span class="inserted"><ins><em>do
- any particular thing in its products. What it does
enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
+ had turned</strong></del></span> <span class="inserted"><ins><em>do
+ any particular thing in its products. What</em></ins></span> it <span
class="removed"><del><strong>off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>does enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
to <span class="removed"><del><strong>Windows 10</a>.</p>
<p>This seems</strong></del></span> <span
class="inserted"><ins><em>do is sue other companies if they do some particular
thing in
@@ -825,7 +834,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 12:31:42 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-back-doors.ja.po 8 May 2019 12:31:42 -0000 1.96
+++ proprietary-back-doors.ja.po 10 May 2019 17:02:55 -0000 1.97
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -160,6 +160,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a href=\"https://www.theverge.com/platform/"
"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
"change\"> back door for remotely changing “user” settings</a>."
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary-back-doors.pot 8 May 2019 12:31:42 -0000 1.66
+++ proprietary-back-doors.pot 10 May 2019 17:02:55 -0000 1.67
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -138,6 +138,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a "
+"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
+"requirement to run a proprietary phone app</a> to be allowed into the event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a "
+"href=\"https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
"
+"near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a "
"href=\"https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change\">
"
"back door for remotely changing “user” settings</a>."
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary-back-doors.ru.po 9 May 2019 08:59:57 -0000 1.174
+++ proprietary-back-doors.ru.po 10 May 2019 17:02:55 -0000 1.175
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -186,6 +187,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Android has a <a href=\"https://www.theverge.com/platform/"
"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
"change\"> back door for remotely changing “user” settings</a>."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-surveillance.de-diff.html 8 May 2019 12:31:42 -0000
1.71
+++ proprietary-surveillance.de-diff.html 10 May 2019 17:02:55 -0000
1.72
@@ -950,6 +950,18 @@
</div>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
@@ -3403,7 +3415,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 12:31:42 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary-surveillance.de.po 8 May 2019 12:31:42 -0000 1.286
+++ proprietary-surveillance.de.po 10 May 2019 17:02:55 -0000 1.287
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1889,6 +1889,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.425
retrieving revision 1.426
diff -u -b -r1.425 -r1.426
--- proprietary-surveillance.fr.po 8 May 2019 16:35:29 -0000 1.425
+++ proprietary-surveillance.fr.po 10 May 2019 17:02:55 -0000 1.426
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-05-08 18:16+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1438,6 +1439,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary-surveillance.it-diff.html 8 May 2019 12:31:42 -0000
1.138
+++ proprietary-surveillance.it-diff.html 10 May 2019 17:02:55 -0000
1.139
@@ -1148,7 +1148,7 @@
<p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1157,65 +1157,81 @@
</div>
<ul class="blurbs">
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user
has
- installed.</strong></del></span> <span class="inserted"><ins><em>is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span> <span class="inserted"><ins><em>“anonymized and
aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a</em></ins></span> proprietary <span
class="removed"><del><strong>apps for mobile devices report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>phone
app</a> to be allowed into</em></ins></span>
+ the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>event.</p>
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
- spying on you</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and
+ <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
+ sensitive data, including user's location</em></ins></span> and
<span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list,
and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
QR-code scanner</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree</em></ins></span> apps <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="inserted"><ins><em>to user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps by the OS in the
- phone.</p>
- <p>Don't be distracted by the question of whether the app
developers get
- users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>control.</p></em></ins></span>
- </li>
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
+ <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>women's
rights</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span class="inserted"><ins><em>equal employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p>
+ </li>
- <p>The FTC criticized this app because it asked the user to
- approve sending</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive</em></ins></span> personal data to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it <span class="removed"><del><strong>to other companies.
This shows the
- weakness</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="inserted"><ins><em>without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have
access</em></ins></span> to
+ the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ </li>
+
+ <li id="M201903201">
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
+ send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send</strong></del></span> <span
class="inserted"><ins><em>understand. In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
+ lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
“consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
</li>
@@ -1269,14 +1285,15 @@
<p>The “smart” toys My Friend Cayla</strong></del></span>
<span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
<span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit <span class="inserted"><ins><em>the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
+ <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in on a child's speech,</strong></del></span>
<span class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>even speak
+ can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
into the toys themselves.</p>
</li>
@@ -1314,56 +1331,64 @@
<p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>data may</strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used
to</em></ins></span>
+ be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it</strong></del></span> <span class="inserted"><ins><em>on Google
Play</em></ins></span> had <span class="removed"><del><strong>sold the
data</strong></del></span> <span class="inserted"><ins><em>one or more
malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span class="removed"><del><strong>figure out
+ them</em></ins></span> to <span class="removed"><del><strong>a
+ data broker, the data broker would have been able to figure out
who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
the user <span class="removed"><del><strong>was.</p>
<p>Following this lawsuit,
<a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span> <span
class="inserted"><ins><em>interface</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>most of them was designed</em></ins></span> to <span
class="removed"><del><strong>the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+ the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="inserted"><ins><em>potential risk because
- there is no easy</em></ins></span> way <span
class="removed"><del><strong>to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and</strong></del></span> <span
class="inserted"><ins><em>of knowing what they really do.</p>
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>150 most popular
+ gratis VPN apps in Google Play</em></ins></span> found <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>access
the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could
listen</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due</em></ins></span> to <span
class="removed"><del><strong>these conversations
was unacceptable by itself.</p></li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used</em></ins></span> to spy on <span
class="removed"><del><strong>children and adults</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on</strong></del></span>
<span class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1373,28 +1398,31 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>their
- source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users. Other
technical flaws were
- found as well.</p>
+<li><p></strong></del></span> <span class="inserted"><ins><em>10
gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ </li>
- <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="inserted"><ins><em><a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>not
really
-clean since</strong></del></span> <span class="inserted"><ins><em>unfortunate
that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding</em></ins></span> that <span
class="inserted"><ins><em>it notify</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>users
of what it will do
+ with the data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>side issue. What
the company does
+ with the data</em></ins></span> is <span class="removed"><del><strong>not
really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
@@ -1403,33 +1431,46 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>a secondary issue. The principal wrong here is that
+ the company gets that data</em></ins></span> at <span
class="removed"><del><strong>Work</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
<div style="clear: left;"></div>
<ul>
<li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ Shows</strong></del></span> <span
class="inserted"><ins><em>all.</p>
+
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
</li>
- <li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>what</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span class="removed"><del><strong>emails
of members of Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+
+ <p>Often</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>send the machine's “advertising ID,” so
that
+ Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
- <li><p>Spyware in Cisco TNP IP phones:
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1441,11 +1482,15 @@
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted
them</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
@@ -1453,7 +1498,10 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1465,203 +1513,77 @@
<ul>
<li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>will do
- with the data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>about a side issue. What</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>a secondary issue.
The principal wrong here is that
- the company gets that data at all.</p>
-
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not</strong></del></span>
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span
class="inserted"><ins><em>say that</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>has a Facebook
- account.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed to check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users that have deleted
them</a>.</p></em></ins></span>
- </li>
-
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>Android</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
+ record the user's location</em></ins></span> even when <span
class="inserted"><ins><em>users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
+ many ways. This is one more.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
- source code they cannot look at.</em></ins></span> The other
- <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
- in <span class="removed"><del><strong>the car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information</em></ins></span>
about <span class="inserted"><ins><em>its users.
+ <p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each
- other but not to</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
+ other but not to the server's database.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>physical store by
noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -1669,7 +1591,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1677,41 +1599,27 @@
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages</em></ins></span> and
<span class="inserted"><ins><em>emails to snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did</em></ins></span> not <span
class="removed"><del><strong>just broadcasts</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
+ for the snooping of these apps.</p>
- <p>On</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps, and
- therefore shares in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>responsibility
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their
being
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
- cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in</strong></del></span> <span class="inserted"><ins><em>source code
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>surveillance.</p>
- </li>
-
- <li><p>More</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
- various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs</strong></del></span>
- <span class="inserted"><ins><em>prevent such snooping, except when the app
developers are clever
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1720,19 +1628,14 @@
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on <span
class="removed"><del><strong>their</strong></del></span>
users</a>.</p>
-
- <span class="removed"><del><strong><p>The report was as of 2014, but
we</strong></del></span>
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
- <span class="inserted"><ins><em><p>With free software apps, users
could <em>make sure</em> that they</em></ins></span>
- don't <span class="removed"><del><strong>expect this has got
better.</p>
+ <p>With free software apps, users could <em>make
sure</em> that they
+ don't snoop.</p>
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>snoop.</p>
-
- <p>With proprietary apps, one can only hope</em></ins></span> that
<span class="removed"><del><strong>laws requiring products to
get</strong></del></span> <span class="inserted"><ins><em>they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
@@ -2296,44 +2199,85 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way to break security on a</em></ins></span>
“smart” <span class="removed"><del><strong>device means the
manufacturer is using it</strong></del></span> <span
class="inserted"><ins><em>TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>video</em></ins></span> they <span
class="removed"><del><strong>report even</strong></del></span> <span
class="inserted"><ins><em>capture to Amazon
servers</a>,</em></ins></span> which <span
class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>video
shows everyone that comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
+ <p>The article focuses on how Ring</em></ins></span> used
+ <span class="removed"><del><strong>by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>let
individual employees look
+ at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when
+ accessed through</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera”
would</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>a better
name!</p>
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>these
+ manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
+ security for your home. Security</em></ins></span> means <span
class="removed"><del><strong>it demands blind faith from its
users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
<li id="M201603220">
@@ -2345,10 +2289,11 @@
<li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ even when</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
</li>
</ul>
@@ -2362,20 +2307,21 @@
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
+ <span class="inserted"><ins><em>into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make <a
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
@@ -2383,67 +2329,107 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
-
- <p>The company that made the vibrator <a
+ standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
+ products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
+ and
+ <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article, is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
+ <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems,</strong></del></span>
+ <span class="inserted"><ins><em>true,</em></ins></span> but <span
class="inserted"><ins><em>it doesn't really matter. If it had
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>data to a data
+ broker,</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
user was.</p>
<p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company <span class="inserted"><ins><em>has been ordered to pay a
total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
<p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>store it.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <li id="M201502180">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>people, DJI is in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
@@ -2456,22 +2442,23 @@
<ul class="blurbs">
<li id="M201904240">
- <p>Some of</em></ins></span> users' <span
class="removed"><del><strong>formal
- consent before collecting</strong></del></span> <span
class="inserted"><ins><em>commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and <span class="removed"><del><strong>not just
broadcasts</strong></del></span> <span class="inserted"><ins><em>Apple
voice assistants do similar things.</p>
<p>A fraction of the Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other</em></ins></span> personal <span
class="inserted"><ins><em>data</a>.</p>
+ location</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>other personal data</a>.</p>
- <p>Since the client program is nonfree, and</em></ins></span> data
<span class="removed"><del><strong>are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>processing is
done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know</em></ins></span> what happens <span
class="removed"><del><strong>if a</strong></del></span> <span
class="inserted"><ins><em>to the recordings unless human eavesdroppers <a
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>nonfree,
and data processing is done
+ “<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
+ the <span class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing
way</em></ins></span> of <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
+ tell you how and where it's done”), users have no</em></ins></span>
way
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>know what happens to</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it</strong></del></span>
<span class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
@@ -2480,31 +2467,42 @@
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the</em></ins></span>
user <span class="removed"><del><strong>declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>is still
- paying for</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
- paid for.</p>
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>not hidden
as</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
- working order.</p>
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+ restrictions</em></ins></span> in
+ <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ working order.</p></em></ins></span>
</li>
- <li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808120">
+ <p>Crackers found a way to break the security of an Amazon device,
+ and</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The
job</em></ins></span> would <span class="removed"><del><strong>say that TVs are
not allowed</strong></del></span> <span class="inserted"><ins><em>be much
- easier for Amazon. And if some government such as China or the US
- told Amazon</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>do this, or cease to
sell</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed to report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
“hacking” to mean “breaking
security”</a>.</p></em></ins></span>
</li>
@@ -3200,7 +3198,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 12:31:42 $
+$Date: 2019/05/10 17:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- proprietary-surveillance.it.po 8 May 2019 12:31:42 -0000 1.299
+++ proprietary-surveillance.it.po 10 May 2019 17:02:56 -0000 1.300
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1839,6 +1839,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary-surveillance.ja-diff.html 8 May 2019 12:31:43 -0000
1.148
+++ proprietary-surveillance.ja-diff.html 10 May 2019 17:02:56 -0000
1.149
@@ -1058,8 +1058,7 @@
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1068,42 +1067,53 @@
</div>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can</em></ins></span> snoop on <span
class="inserted"><ins><em>a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ </li>
+
<li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
+ <p>Data collected by menstrual and pregnancy monitoring
apps</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
available</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>OS in the
+ phone.</p>
<p>Don't</strong></del></span>
<span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
<span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
users</strong></del></span> <span
class="inserted"><ins><em>app.</p>
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for</strong></del></span> <span
class="inserted"><ins><em>equal employment
- and freedom to make their own pregnancy choices. Don't</em></ins></span>
use <span class="removed"><del><strong>by companies.</a></p>
-
- <p>The FTC criticized this</strong></del></span>
- <span class="inserted"><ins><em>these apps, even if someone offers you a
reward to do so. A
- free-software</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em>that does more or less</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying on you is available from <a
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span class="inserted"><ins><em>equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>available from <a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
+ a new one is being developed</a>.</p></em></ins></span>
</li>
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to
- <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>sensitive</em></ins></span> data <span
class="inserted"><ins><em>without
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have
access</em></ins></span> to
+ the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
+
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
surveillance on which</em></ins></span> the
@@ -1149,14 +1159,8 @@
spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
- </li>
-
- <li id="M201902140">
- <p>The AppCensus database gives</em></ins></span> information on
<a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
More about NSA app spying</a>.</p>
@@ -1171,9 +1175,16 @@
<ul>
- <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots of personal information
about</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.appcensus.mobi"></em></ins></span>
how
+ <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+
+ <p>It shows</em></ins></span> that <span
class="removed"><del><strong>makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>no one can trust a nonfree program, not even the
+ developers</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p>
+ </li>
+
+ <li id="M201902140">
+ <p>The AppCensus database gives</em></ins></span> information <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>on <a
+ href="https://www.appcensus.mobi"></em></ins></span> how
<span class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>Android apps</em></ins></span> use <span
class="removed"><del><strong>it</a>.</p>
<p>The company's statement that it anonymizes the data may be
@@ -1211,19 +1222,23 @@
<span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
<span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p></strong></del></span>
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
+ </li>
+</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1238,12 +1253,10 @@
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>redirecting
them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
@@ -1286,8 +1299,8 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>members of Parliament
+ <p>Specifically, it can collect the emails of
members</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
this way, because</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
@@ -1416,24 +1429,26 @@
<p>Even if no one connects to the car
remotely,</strong></del></span> the <span class="removed"><del><strong>cell
phone
modem enables</strong></del></span> <span class="inserted"><ins><em>same
machine via
various apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>phone company to
track</strong></del></span> <span class="inserted"><ins><em>user's activities
in</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>app; others only say
that</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span>
is <span class="removed"><del><strong>possible to physically
remove</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
-
- <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
- account.</p></em></ins></span>
+ the <span class="removed"><del><strong>phone company to
track</strong></del></span> <span class="inserted"><ins><em>user's activities
in</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>app; others only say
that</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span>
is <span class="removed"><del><strong>possible to physically remove the cell
phone modem
+ though.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
+ <li><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which</strong></del></span>
+ <span class="inserted"><ins><em>using that app, but that
alone</em></ins></span> is <span class="removed"><del><strong>made available to
car manufacturers, insurance companies, and
others.</p>
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
+ really</strong></del></span> <span class="inserted"><ins><em>whether the
user has</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>Facebook
+ account.</p>
+ </li>
+
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>users that have
deleted them</a>.</p>
</li>
@@ -1497,12 +1512,12 @@
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at.</em></ins></span> The other <span
class="removed"><del><strong>day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the</strong></del></span> <span
class="inserted"><ins><em>apps might be snooping
@@ -1527,74 +1542,70 @@
not work.”</p>
<p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps from the free
software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>TVs
are not allowed to report what</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the user <span class="removed"><del><strong>watches — no
exceptions!</p></strong></del></span> <span class="inserted"><ins><em>if
an app contains anti-features</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users</em></ins></span> are <span
class="inserted"><ins><em>HIV-positive, then provides the information to
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> to <span
class="removed"><del><strong>report what</strong></del></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>server's database.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass app and dis-service
- spy</em></ins></span> on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>users even more
than users expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
-
- <p>Don't be tracked—pay cash!</p>
- </li>
-
- <li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>detail</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some
trackers</em></ins></span> can <span class="removed"><del><strong>track you
+ It could be designed</em></ins></span> so that <span
class="removed"><del><strong>advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store</em></ins></span> by
<span class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>noticing WiFi
- networks</a>.</p></em></ins></span>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>users communicate such info</em></ins></span> to
<span class="removed"><del><strong>turn this off,</strong></del></span> <span
class="inserted"><ins><em>each
+ other</em></ins></span> but <span class="removed"><del><strong>having it
enabled by default
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media profiles the company
already
monitors. Tivo customers are unaware they're being watched by
advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>,
exposing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads</em></ins></span> all <span class="removed"><del><strong>users to
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
new combined surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>phone numbers</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>email
addresses</a></em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>user's address
- book</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note</em></ins></span> that
<span class="removed"><del><strong>they are nearby. Once your
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ </li>
+
+ <li id="M201803050">
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible sounds to be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>dis-service
+ spy</em></ins></span> on <span class="removed"><del><strong>other devices
in
+ range so as to determine that</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where</em></ins></span> they <span class="removed"><del><strong>are
nearby. Once your
Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>travel before</em></ins></span> and
+ <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>after going to a movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive</em></ins></span> and <span
class="inserted"><ins><em>sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
+ networks</a>.</p></em></ins></span>
</li>
- <li><p>Vizio “smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>words
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708270">
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads</em></ins></span> all <span class="inserted"><ins><em>phone
numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p></em></ins></span>
</li>
@@ -1698,14 +1709,11 @@
<p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span class="removed"><del><strong>wide
range</strong></del></span> <span class="inserted"><ins><em>spyware app for its
headphones</a>. Specifically,
- the app would record the names</em></ins></span> of <span
class="removed"><del><strong>data about their</strong></del></span> <span
class="inserted"><ins><em>the audio files</em></ins></span> users <span
class="removed"><del><strong>and their</strong></del></span> <span
class="inserted"><ins><em>listen to
+ distributing</em></ins></span> a <span class="removed"><del><strong>wide
range of data about their</strong></del></span> <span
class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,
+ the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the</em></ins></span>
users'
- <span class="removed"><del><strong>friends and
associates</a>.</p>
-
- <p>Even nastier,</strong></del></span> <span
class="inserted"><ins><em>consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
@@ -1724,7 +1732,7 @@
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when</em></ins></span>
they <span class="removed"><del><strong>do</strong></del></span> <span
class="inserted"><ins><em>use
+ about the users' searches that Google normally gets when they use
its search engine.</p>
<p>Currently, the app is <a
@@ -1761,8 +1769,8 @@
guarantees and abusive practices inflicted by VPN apps.”</p>
<p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
- privacy:</p>
+ of some proprietary VPN apps that track</em></ins></span> users and <span
class="inserted"><ins><em>infringe</em></ins></span> their
+ <span class="inserted"><ins><em>privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
@@ -1771,29 +1779,31 @@
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
- text messages.</dd>
+ permissions upon installation, meaning it has full access
to</em></ins></span> users'
+ <span class="removed"><del><strong>friends</strong></del></span>
+ <span class="inserted"><ins><em>text messages.</dd>
+
+ <dt>DroidVPN</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
- <dt>DroidVPN and TigerVPN</dt>
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>TigerVPN</dt>
<dd>Requests the <code>READ_LOGS</code> permission to
read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>stores detailed
logs and
may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display ads. Uses
- roughly five tracking libraries. Also,</em></ins></span> it <span
class="inserted"><ins><em>redirects the user's
- traffic</em></ins></span> through <span class="removed"><del><strong>ad
networks</strong></del></span> <span class="inserted"><ins><em>valueclick.com
(an advertising website).</dd>
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have
confirmed</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span>
- the <span class="removed"><del><strong>data
- collected</strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection for
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
</dl>
</li>
@@ -2630,7 +2640,8 @@
<p>The case of toll-collection systems, mentioned in this article,
is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but the invasion isn't done</em></ins></span>
by <span class="removed"><del><strong>various cr…apps and sites
made</strong></del></span> <span class="inserted"><ins><em>malware. The
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
+ collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
companies.</p>
@@ -3045,7 +3056,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 12:31:43 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.272
retrieving revision 1.273
diff -u -b -r1.272 -r1.273
--- proprietary-surveillance.ja.po 8 May 2019 12:31:44 -0000 1.272
+++ proprietary-surveillance.ja.po 10 May 2019 17:02:56 -0000 1.273
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1523,6 +1523,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary-surveillance.pot 8 May 2019 12:31:44 -0000 1.220
+++ proprietary-surveillance.pot 10 May 2019 17:02:56 -0000 1.221
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1018,6 +1018,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a "
+"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
+"requirement to run a proprietary phone app</a> to be allowed into the event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a "
+"href=\"https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
"
+"near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a "
"href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\">
"
"available to employers and insurance companies</a>. Even though the data is "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.519
retrieving revision 1.520
diff -u -b -r1.519 -r1.520
--- proprietary-surveillance.ru.po 9 May 2019 08:59:57 -0000 1.519
+++ proprietary-surveillance.ru.po 10 May 2019 17:02:56 -0000 1.520
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1424,6 +1425,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary.de-diff.html 8 May 2019 15:01:37 -0000 1.92
+++ proprietary.de-diff.html 10 May 2019 17:02:56 -0000 1.93
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,11 +126,11 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -186,6 +186,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -239,23 +251,6 @@
Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
going to be based on Chromium.</p>
</li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
- </li>
</ul></em></ins></span>
@@ -316,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:37 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.de.po 8 May 2019 15:01:37 -0000 1.134
+++ proprietary.de.po 10 May 2019 17:02:56 -0000 1.135
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -505,26 +521,6 @@
"that going to be based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.es.po 9 May 2019 10:08:26 -0000 1.162
+++ proprietary.es.po 10 May 2019 17:02:56 -0000 1.163
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -408,40 +425,6 @@
"Opera, Microsoft Edge y también en la próxima versión de Microsoft Edge
que "
"estará basada en Chromium."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-"Los datos recopilados por las aplicaciones de control menstrual y de "
-"embarazo se ponen a menudo <a href=\"https://www.theguardian.com/world/2019/"
-"apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\">a "
-"disposición de los empleadores y compañÃas de seguros</a>. Aun cuando los "
-"datos son «anonimizados y agregados», se puede fácilmente seguir su rastro
"
-"hasta llegar a la mujer que utiliza la aplicación."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-"Esto tiene graves consecuencias para los derechos de las mujeres a la "
-"igualdad en el trabajo y a su libertad de elección con respecto a la "
-"maternidad. No utilice estas aplicaciones ni siquiera cuando le ofrezcan una "
-"recompensa por hacerlo. Puede obtener una aplicación de software libre que "
-"hace más o menos lo mismo en <a href=\"https://search.f-droid.org/?q=menstr"
-"\">F-Droid</a>, y <a href=\"https://www.bloomberg.com/news/audio/2019-04-10/"
-"building-a-better-period-tracking-app-podcast\">hay una nueva en desarrollo</"
-"a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -521,6 +504,40 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
+#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
+#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
+#~ "and insurance companies</a>. Even though the data is “anonymized "
+#~ "and aggregated,” it can easily be traced back to the woman who uses "
+#~ "the app."
+#~ msgstr ""
+#~ "Los datos recopilados por las aplicaciones de control menstrual y de "
+#~ "embarazo se ponen a menudo <a href=\"https://www.theguardian.com/"
+#~ "world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-"
+#~ "surveillance\">a disposición de los empleadores y compañÃas de
seguros</"
+#~ "a>. Aun cuando los datos son «anonimizados y agregados», se puede "
+#~ "fácilmente seguir su rastro hasta llegar a la mujer que utiliza la "
+#~ "aplicación."
+
+#~ msgid ""
+#~ "This has harmful implications for women's rights to equal employment and "
+#~ "freedom to make their own pregnancy choices. Don't use these apps, even "
+#~ "if someone offers you a reward to do so. A free-software app that does "
+#~ "more or less the same thing without spying on you is available from <a "
+#~ "href=\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href="
+#~ "\"https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-"
+#~ "period-tracking-app-podcast\"> a new one is being developed</a>."
+#~ msgstr ""
+#~ "Esto tiene graves consecuencias para los derechos de las mujeres a la "
+#~ "igualdad en el trabajo y a su libertad de elección con respecto a la "
+#~ "maternidad. No utilice estas aplicaciones ni siquiera cuando le ofrezcan "
+#~ "una recompensa por hacerlo. Puede obtener una aplicación de software "
+#~ "libre que hace más o menos lo mismo en <a href=\"https://search.f-droid."
+#~ "org/?q=menstr\">F-Droid</a>, y <a href=\"https://www.bloomberg.com/news/"
+#~ "audio/2019-04-10/building-a-better-period-tracking-app-podcast\">hay una "
+#~ "nueva en desarrollo</a>."
+
+#~ msgid ""
#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/"
#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
#~ "“remediation” program</a> on computers running certain "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.fr.po 8 May 2019 16:35:31 -0000 1.201
+++ proprietary.fr.po 10 May 2019 17:02:56 -0000 1.202
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-05-08 18:16+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -405,40 +422,6 @@
"\">envoie les IPs des utilisateurs</a> qui suivent les liens munis de "
"l'attribut <cite>ping</cite> à l'URL définie dans cet attribut."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-"Les données collectées par les applis surveillant le cycle menstruel et la "
-"grossesse sont souvent <a href=\"https://www.theguardian.com/world/2019/"
-"apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"
-"\">accessibles aux employeurs et aux compagnies d'assurance</a>. Bien que "
-"ces données soient « anonymisées et agrégées », on peut facilement
retrouver "
-"quelle femme utilise l'appli."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-"Ceci a des implications néfastes pour les droits des femmes à la non-"
-"discrimination dans l'emploi et au libre choix en matière de maternité. "
-"N'utilisez pas ces applis, même si quelqu'un vous propose une récompense "
-"pour cela. Il existe sur <a href=\"https://search.f-droid.org/?q=menstr\">F-"
-"Droid</a> une appli libre qui fait plus ou moins la même chose sans vous "
-"espionner, et <a href=\"https://www.bloomberg.com/news/audio/2019-04-10/"
-"building-a-better-period-tracking-app-podcast\">une autre est en "
-"développement</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,3 +495,36 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
+#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
+#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
+#~ "and insurance companies</a>. Even though the data is “anonymized "
+#~ "and aggregated,” it can easily be traced back to the woman who uses "
+#~ "the app."
+#~ msgstr ""
+#~ "Les données collectées par les applis surveillant le cycle menstruel et "
+#~ "la grossesse sont souvent <a href=\"https://www.theguardian.com/"
+#~ "world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-"
+#~ "surveillance\">accessibles aux employeurs et aux compagnies d'assurance</"
+#~ "a>. Bien que ces données soient « anonymisées et agrégées », on
peut "
+#~ "facilement retrouver quelle femme utilise l'appli."
+
+#~ msgid ""
+#~ "This has harmful implications for women's rights to equal employment and "
+#~ "freedom to make their own pregnancy choices. Don't use these apps, even "
+#~ "if someone offers you a reward to do so. A free-software app that does "
+#~ "more or less the same thing without spying on you is available from <a "
+#~ "href=\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href="
+#~ "\"https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-"
+#~ "period-tracking-app-podcast\"> a new one is being developed</a>."
+#~ msgstr ""
+#~ "Ceci a des implications néfastes pour les droits des femmes à la non-"
+#~ "discrimination dans l'emploi et au libre choix en matière de maternité. "
+#~ "N'utilisez pas ces applis, même si quelqu'un vous propose une récompense
"
+#~ "pour cela. Il existe sur <a href=\"https://search.f-droid.org/?q=menstr"
+#~ "\">F-Droid</a> une appli libre qui fait plus ou moins la même chose sans "
+#~ "vous espionner, et <a href=\"https://www.bloomberg.com/news/"
+#~ "audio/2019-04-10/building-a-better-period-tracking-app-podcast\">une "
+#~ "autre est en développement</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary.it-diff.html 8 May 2019 15:01:37 -0000 1.104
+++ proprietary.it-diff.html 10 May 2019 17:02:56 -0000 1.105
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -238,23 +250,6 @@
Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
going to be based on Chromium.</p>
</li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:37 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.it.po 8 May 2019 15:01:37 -0000 1.143
+++ proprietary.it.po 10 May 2019 17:02:56 -0000 1.144
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -509,26 +525,6 @@
"that going to be based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.ja-diff.html 8 May 2019 15:01:37 -0000 1.105
+++ proprietary.ja-diff.html 10 May 2019 17:02:56 -0000 1.106
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -235,23 +247,6 @@
Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
going to be based on Chromium.</p>
</li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
- </li>
</ul></em></ins></span>
@@ -312,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:37 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary.ja.po 8 May 2019 15:01:37 -0000 1.126
+++ proprietary.ja.po 10 May 2019 17:02:56 -0000 1.127
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -427,26 +443,6 @@
"that going to be based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary.nl-diff.html 8 May 2019 15:01:37 -0000 1.104
+++ proprietary.nl-diff.html 10 May 2019 17:02:56 -0000 1.105
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -238,23 +250,6 @@
Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
going to be based on Chromium.</p>
</li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:37 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.nl.po 8 May 2019 15:01:37 -0000 1.115
+++ proprietary.nl.po 10 May 2019 17:02:56 -0000 1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -502,26 +518,6 @@
"that going to be based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.pl-diff.html 8 May 2019 15:01:37 -0000 1.122
+++ proprietary.pl-diff.html 10 May 2019 17:02:56 -0000 1.123
@@ -183,6 +183,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -236,23 +248,6 @@
Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
going to be based on Chromium.</p>
</li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
- </li>
</ul></em></ins></span>
@@ -313,7 +308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:37 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.pl.po 8 May 2019 15:01:37 -0000 1.110
+++ proprietary.pl.po 10 May 2019 17:02:56 -0000 1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -585,26 +601,6 @@
"that going to be based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.pot 8 May 2019 15:01:37 -0000 1.107
+++ proprietary.pot 10 May 2019 17:02:56 -0000 1.108
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a "
+"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
+"requirement to run a proprietary phone app</a> to be allowed into the event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a "
+"href=\"https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
"
+"near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a "
"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
"company made them all cease to work</a> by shutting down that server."
@@ -315,26 +330,6 @@
"based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a "
-"href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\">
"
-"available to employers and insurance companies</a>. Even though the data is "
-"“anonymized and aggregated,” it can easily be traced back to the "
-"woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a "
-"href=\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a "
-"href=\"https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast\">
"
-"a new one is being developed</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.pt-br.po 8 May 2019 17:02:07 -0000 1.162
+++ proprietary.pt-br.po 10 May 2019 17:02:56 -0000 1.163
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-05-08 13:13-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -296,6 +297,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -399,40 +416,6 @@
"ping</a> no Apple Safari, Google Chrome, Opera, Microsoft Edge e também no "
"Microsoft Edge que será baseado no Chromium."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-"Os dados coletados pelos aplicativos de monitoramento menstrual e de "
-"gravidez estão muitas vezes <a
href=\"https://www.theguardian.com/world/2019/"
-"apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"
-"\">disponÃveis para empregadores e empresas de seguros</a>. Mesmo que os "
-"dados sejam âanônimos e agregadosâ, pode ser facilmente rastreável até
a "
-"mulher que usa o aplicativo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-"Isto tem implicações prejudiciais para os direitos das mulheres a igualdade
"
-"de emprego e liberdade de fazer suas próprias escolhas de gravidez. Não use
"
-"esses aplicativos, mesmo que alguém lhe ofereça uma recompensa para isso.
Um "
-"aplicativo de software livre que faz mais ou menos a mesma coisa sem
espioná-"
-"lo está disponÃvel no <a href=\"https://search.f-droid.org/?q=menstr\">F-"
-"Droid</a> e <a href=\"https://www.bloomberg.com/news/audio/2019-04-10/"
-"building-a-better-period-tracking-app-podcast\"> um novo está sendo "
-"desenvolvido</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -508,6 +491,39 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
+#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
+#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
+#~ "and insurance companies</a>. Even though the data is “anonymized "
+#~ "and aggregated,” it can easily be traced back to the woman who uses "
+#~ "the app."
+#~ msgstr ""
+#~ "Os dados coletados pelos aplicativos de monitoramento menstrual e de "
+#~ "gravidez estão muitas vezes <a href=\"https://www.theguardian.com/"
+#~ "world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-"
+#~ "surveillance\">disponÃveis para empregadores e empresas de seguros</a>. "
+#~ "Mesmo que os dados sejam âanônimos e agregadosâ, pode ser facilmente "
+#~ "rastreável até a mulher que usa o aplicativo."
+
+#~ msgid ""
+#~ "This has harmful implications for women's rights to equal employment and "
+#~ "freedom to make their own pregnancy choices. Don't use these apps, even "
+#~ "if someone offers you a reward to do so. A free-software app that does "
+#~ "more or less the same thing without spying on you is available from <a "
+#~ "href=\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href="
+#~ "\"https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-"
+#~ "period-tracking-app-podcast\"> a new one is being developed</a>."
+#~ msgstr ""
+#~ "Isto tem implicações prejudiciais para os direitos das mulheres a "
+#~ "igualdade de emprego e liberdade de fazer suas próprias escolhas de "
+#~ "gravidez. Não use esses aplicativos, mesmo que alguém lhe ofereça uma "
+#~ "recompensa para isso. Um aplicativo de software livre que faz mais ou "
+#~ "menos a mesma coisa sem espioná-lo está disponÃvel no <a
href=\"https://"
+#~ "search.f-droid.org/?q=menstr\">F-Droid</a> e <a href=\"https://www."
+#~ "bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-"
+#~ "podcast\"> um novo está sendo desenvolvido</a>."
+
+#~ msgid ""
#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/"
#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
#~ "“remediation” program</a> on computers running certain "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.ru.po 9 May 2019 08:59:57 -0000 1.236
+++ proprietary.ru.po 10 May 2019 17:02:56 -0000 1.237
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-10 16:57+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -405,41 +422,6 @@
"Microsoft Edge, а Ñакже в гоÑовÑÑемÑÑ Ðº вÑпÑÑкÑ
Microsoft Edge, коÑоÑÑй "
"бÑдÑÑ Ð´ÐµÐ»Ð°ÑÑ Ð½Ð° базе Chromium."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-"ÐаннÑе, ÑобиÑаемÑе пÑиложениÑми
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° менÑÑÑÑаÑией и
беÑеменноÑÑÑÑ, "
-"ÑаÑÑо <a
href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-"
-"side-to-womens-health-apps-menstrual-surveillance\"> доÑÑÑпнÑ
ÑабоÑодаÑелÑм "
-"и ÑÑÑаÑ
овÑм компаниÑм</a>. ХоÑÑ Ð´Ð°Ð½Ð½Ñе
“анонимизиÑÑÑÑÑÑ Ð¸ "
-"ÑÑммиÑÑÑÑÑÑ”, иÑ
легко оÑÑледиÑÑ Ð´Ð¾
женÑинÑ, коÑоÑÐ°Ñ Ð¿Ð¾Ð»ÑзÑеÑÑÑ "
-"пÑиложением."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-"ÐÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº вÑеднÑм поÑледÑÑвиÑм длÑ
пÑав женÑин на ÑавнÑе ÑÑÐ»Ð¾Ð²Ð¸Ñ ÑÑÑда "
-"и ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿ÑинимаÑÑ ÑеÑÐµÐ½Ð¸Ñ Ð¾ ÑобÑÑвенной
беÑеманноÑÑи. Ðе полÑзÑйÑеÑÑ ÑÑими "
-"пÑиложениÑми, даже еÑли кÑо-Ñо пÑедлагаеÑ
вам за ÑÑо вознагÑаждение. Ðе "
-"полÑзÑйÑеÑÑ ÑÑими пÑиложениÑми, даже еÑли
кÑо-Ñо пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼ за ÑÑо "
-"вознагÑаждение. Свободное пÑиложение,
коÑоÑое вÑполнÑÐµÑ Ð±Ð¾Ð»ÐµÐµ или менее ÑÑ "
-"же ÑабоÑÑ, не ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð° вами, можно
полÑÑиÑÑ Ð½Ð° <a href=\"https://search.f-"
-"droid.org/?q=menstr\">F-Droid</a>, и <a href=\"https://www.bloomberg.com/"
-"news/audio/2019-04-10/building-a-better-period-tracking-app-podcast\"> "
-"ÑазÑабаÑÑваеÑÑÑ Ð½Ð¾Ð²Ð°Ñ Ð¿ÑогÑамма</a>."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -519,6 +501,40 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
+#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
+#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
+#~ "and insurance companies</a>. Even though the data is “anonymized "
+#~ "and aggregated,” it can easily be traced back to the woman who uses "
+#~ "the app."
+#~ msgstr ""
+#~ "ÐаннÑе, ÑобиÑаемÑе пÑиложениÑми
наблÑÐ´ÐµÐ½Ð¸Ñ Ð·Ð° менÑÑÑÑаÑией и "
+#~ "беÑеменноÑÑÑÑ, ÑаÑÑо <a
href=\"https://www.theguardian.com/world/2019/"
+#~ "apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\"> "
+#~ "доÑÑÑÐ¿Ð½Ñ ÑабоÑодаÑелÑм и ÑÑÑаÑ
овÑм
компаниÑм</a>. ХоÑÑ Ð´Ð°Ð½Ð½Ñе “"
+#~ "анонимизиÑÑÑÑÑÑ Ð¸ ÑÑммиÑÑÑÑÑÑ”, иÑ
легко оÑÑледиÑÑ Ð´Ð¾ женÑинÑ, "
+#~ "коÑоÑÐ°Ñ Ð¿Ð¾Ð»ÑзÑеÑÑÑ Ð¿Ñиложением."
+
+#~ msgid ""
+#~ "This has harmful implications for women's rights to equal employment and "
+#~ "freedom to make their own pregnancy choices. Don't use these apps, even "
+#~ "if someone offers you a reward to do so. A free-software app that does "
+#~ "more or less the same thing without spying on you is available from <a "
+#~ "href=\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href="
+#~ "\"https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-"
+#~ "period-tracking-app-podcast\"> a new one is being developed</a>."
+#~ msgstr ""
+#~ "ÐÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº вÑеднÑм поÑледÑÑвиÑм длÑ
пÑав женÑин на ÑавнÑе ÑÑÐ»Ð¾Ð²Ð¸Ñ "
+#~ "ÑÑÑда и ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿ÑинимаÑÑ ÑеÑÐµÐ½Ð¸Ñ Ð¾
ÑобÑÑвенной беÑеманноÑÑи. Ðе "
+#~ "полÑзÑйÑеÑÑ ÑÑими пÑиложениÑми, даже
еÑли кÑо-Ñо пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼ за ÑÑо "
+#~ "вознагÑаждение. Ðе полÑзÑйÑеÑÑ ÑÑими
пÑиложениÑми, даже еÑли кÑо-Ñо "
+#~ "пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð²Ð°Ð¼ за ÑÑо вознагÑаждение.
Свободное пÑиложение, коÑоÑое "
+#~ "вÑполнÑÐµÑ Ð±Ð¾Ð»ÐµÐµ или менее ÑÑ Ð¶Ðµ ÑабоÑÑ,
не ÑÐ¿Ð¸Ð¾Ð½Ñ Ð·Ð° вами, можно полÑÑиÑÑ "
+#~ "на <a href=\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, и <a "
+#~ "href=\"https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-"
+#~ "period-tracking-app-podcast\"> ÑазÑабаÑÑваеÑÑÑ Ð½Ð¾Ð²Ð°Ñ
пÑогÑамма</a>."
+
+#~ msgid ""
#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/"
#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
#~ "“remediation” program</a> on computers running certain "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.zh-tw-diff.html 8 May 2019 15:01:37 -0000 1.82
+++ proprietary.zh-tw-diff.html 10 May 2019 17:02:56 -0000 1.83
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,11 +126,11 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -186,6 +186,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -239,23 +251,6 @@
Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
going to be based on Chromium.</p>
</li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
- </li>
</ul></em></ins></span>
@@ -316,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:37 $
+$Date: 2019/05/10 17:02:56 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.zh-tw.po 8 May 2019 15:01:37 -0000 1.93
+++ proprietary.zh-tw.po 10 May 2019 17:02:56 -0000 1.94
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-10 16:57+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -416,26 +432,6 @@
"that going to be based on Chromium."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Data collected by menstrual and pregnancy monitoring apps is often <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
-"health-apps-menstrual-surveillance\"> available to employers and insurance "
-"companies</a>. Even though the data is “anonymized and aggregated,"
-"” it can easily be traced back to the woman who uses the app."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This has harmful implications for women's rights to equal employment and "
-"freedom to make their own pregnancy choices. Don't use these apps, even if "
-"someone offers you a reward to do so. A free-software app that does more or "
-"less the same thing without spying on you is available from <a href="
-"\"https://search.f-droid.org/?q=menstr\">F-Droid</a>, and <a href=\"https://"
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> a new one is being developed</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- pt-br.po 9 May 2019 16:00:40 -0000 1.112
+++ pt-br.po 10 May 2019 17:02:56 -0000 1.113
@@ -4639,6 +4639,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- ru.po 10 May 2019 07:29:34 -0000 1.185
+++ ru.po 10 May 2019 17:02:56 -0000 1.186
@@ -6252,6 +6252,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- zh-tw.po 9 May 2019 16:00:40 -0000 1.86
+++ zh-tw.po 10 May 2019 17:02:56 -0000 1.87
@@ -4294,6 +4294,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
+"\"> requirement to run a proprietary phone app</a> to be allowed into the "
+"event."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This app is a spyware that can snoop on a lot of sensitive data, including "
+"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
+"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+"\"> near-complete control</a> over the phone."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Data collected by menstrual and pregnancy monitoring apps is often <a href="
"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-"
"health-apps-menstrual-surveillance\"> available to employers and insurance "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/09
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/18
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/29