[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Wed, 29 May 2019 02:01:01 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/05/29 02:01:00
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-amazon.de-diff.html
malware-amazon.de.po malware-amazon.es.po
malware-amazon.fr.po
malware-amazon.it-diff.html
malware-amazon.it.po
malware-amazon.ja-diff.html
malware-amazon.ja.po malware-amazon.pot
malware-amazon.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.427&r2=1.428
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.524&r2=1.525
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.88&r2=1.89
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- de.po 28 May 2019 11:03:19 -0000 1.89
+++ de.po 29 May 2019 06:00:57 -0000 1.90
@@ -539,6 +539,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- es.po 28 May 2019 11:03:21 -0000 1.119
+++ es.po 29 May 2019 06:00:57 -0000 1.120
@@ -413,6 +413,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- fr.po 18 May 2019 12:25:57 -0000 1.153
+++ fr.po 29 May 2019 06:00:57 -0000 1.154
@@ -416,6 +416,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- it.po 28 May 2019 11:03:21 -0000 1.89
+++ it.po 29 May 2019 06:00:57 -0000 1.90
@@ -498,6 +498,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- ja.po 18 May 2019 08:29:44 -0000 1.88
+++ ja.po 29 May 2019 06:00:57 -0000 1.89
@@ -448,6 +448,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-amazon.de-diff.html 27 Apr 2019 19:30:03 -0000 1.20
+++ malware-amazon.de-diff.html 29 May 2019 06:00:57 -0000 1.21
@@ -63,13 +63,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p></em></ins></span>
+to serve as specific substantiation.</p>
+</div></em></ins></span>
</div>
<span class="removed"><del><strong><h2</strong></del></span>
-<span class="inserted"><ins><em></div>
-<p class="c" style="font-size: 1.2em">
+<span class="inserted"><ins><em><p class="c" style="font-size: 1.2em">
<a href="#swindle">Kindle Swindle</a>
<a href="#echo">Echo</a>
<a href="#misc">Other products</a>
@@ -207,6 +207,28 @@
<span class="inserted"><ins><em><h4
id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -348,7 +370,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 19:30:03 $
+$Date: 2019/05/29 06:00:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-amazon.de.po 27 Apr 2019 19:30:03 -0000 1.24
+++ malware-amazon.de.po 29 May 2019 06:00:57 -0000 1.25
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2017-09-26 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -280,6 +280,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-amazon.es.po 1 May 2019 08:47:34 -0000 1.32
+++ malware-amazon.es.po 29 May 2019 06:00:57 -0000 1.33
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-05-01 10:40+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -212,6 +213,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-amazon.fr.po 28 Apr 2019 13:35:40 -0000 1.38
+++ malware-amazon.fr.po 29 May 2019 06:00:57 -0000 1.39
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-04-28 15:33+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -208,6 +209,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-amazon.it-diff.html 27 Apr 2019 19:30:03 -0000 1.34
+++ malware-amazon.it-diff.html 29 May 2019 06:00:57 -0000 1.35
@@ -63,13 +63,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p></em></ins></span>
+to serve as specific substantiation.</p>
+</div></em></ins></span>
</div>
<span class="removed"><del><strong><h2</strong></del></span>
-<span class="inserted"><ins><em></div>
-<p class="c" style="font-size: 1.2em">
+<span class="inserted"><ins><em><p class="c" style="font-size: 1.2em">
<a href="#swindle">Kindle Swindle</a>
<a href="#echo">Echo</a>
<a href="#misc">Other products</a>
@@ -207,6 +207,28 @@
<span class="inserted"><ins><em><h4
id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -348,7 +370,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 19:30:03 $
+$Date: 2019/05/29 06:00:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-amazon.it.po 27 Apr 2019 19:30:03 -0000 1.27
+++ malware-amazon.it.po 29 May 2019 06:00:57 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -258,6 +258,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-amazon.ja-diff.html 27 Apr 2019 19:30:03 -0000 1.31
+++ malware-amazon.ja-diff.html 29 May 2019 06:00:57 -0000 1.32
@@ -196,6 +196,28 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -337,7 +359,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/27 19:30:03 $
+$Date: 2019/05/29 06:00:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-amazon.ja.po 27 Apr 2019 19:30:04 -0000 1.18
+++ malware-amazon.ja.po 29 May 2019 06:00:57 -0000 1.19
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2016-10-31 11:24+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -227,6 +227,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-amazon.pot 27 Apr 2019 19:30:04 -0000 1.17
+++ malware-amazon.pot 29 May 2019 06:00:57 -0000 1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -154,6 +154,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\">
"
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a "
"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-amazon.ru.po 28 Apr 2019 10:29:25 -0000 1.41
+++ malware-amazon.ru.po 29 May 2019 06:00:57 -0000 1.42
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-27 19:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2018-10-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -209,6 +210,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- nl.po 28 May 2019 11:03:21 -0000 1.89
+++ nl.po 29 May 2019 06:00:57 -0000 1.90
@@ -407,6 +407,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- pl.po 28 May 2019 11:03:21 -0000 1.89
+++ pl.po 29 May 2019 06:00:57 -0000 1.90
@@ -351,6 +351,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- pot 18 May 2019 08:29:44 -0000 1.88
+++ pot 29 May 2019 06:00:57 -0000 1.89
@@ -296,6 +296,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-surveillance.de-diff.html 10 May 2019 17:02:55 -0000
1.72
+++ proprietary-surveillance.de-diff.html 29 May 2019 06:00:57 -0000
1.73
@@ -1086,7 +1086,8 @@
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>WeatherBug, are
tracking people's locations.</p>
</li>
@@ -1139,14 +1140,15 @@
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>read logs
+ for</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ in</em></ins></span> other <span class="inserted"><ins><em>ways.</p>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
+ <p>This is evidence that proprietary</em></ins></span> apps <span
class="inserted"><ins><em>generally work against
+ their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN
developers</strong></del></span> <span class="inserted"><ins><em>freedom,
Android users
need to get rid of the proprietary software—both proprietary
Android by <a href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
@@ -1161,29 +1163,26 @@
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
+ <p>Grindr should not</em></ins></span> have <span
class="removed"><del><strong>confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>LinkedIn. Also, it stores detailed
logs</strong></del></span> <span class="inserted"><ins><em>each
other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>may turn</strong></del></span> <span
class="inserted"><ins><em>dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>after
going</em></ins></span> to <span class="removed"><del><strong>read logs
- for other</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android</em></ins></span> apps
- <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1193,7 +1192,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span class="removed"><del><strong>LinkedIn.
Also, it stores detailed logs</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1201,9 +1200,9 @@
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="removed"><del><strong>may
turn</strong></del></span> <span
class="inserted"><ins><em>sent</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>and text messages and emails</em></ins></span> to
<span class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>UK government if
+ <p>Google did not intend</em></ins></span> to <span
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the <span
class="removed"><del><strong>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -1220,14 +1219,14 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>non-premium version</strong></del></span>
<span class="inserted"><ins><em>responsibility for the injustice of their being
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="inserted"><ins><em>preventing apps from
+ <p>Could Google</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
@@ -1265,18 +1264,17 @@
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that <span
class="removed"><del><strong>they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps</strong></del></span> <span
class="inserted"><ins><em>they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
@@ -1293,146 +1291,149 @@
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said</em></ins></span> that <span
class="removed"><del><strong>track</strong></del></span> users <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>gave consent for this,
- would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from
beacons placed in stores or played by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>design
- the app to snoop at all</a>.</p></em></ins></span>
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
+ <li id="M201704074">
<p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703300">
+ <li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
+ announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</em></ins></span> the
<span class="removed"><del><strong>personal details</strong></del></span> <span
class="inserted"><ins><em>user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>spyware is
- still spyware.</p>
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p></em></ins></span>
</li>
- <li id="M201701210">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude to transmit users'
personal</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user</em></ins></span> data to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese
company</a>.</p></em></ins></span>
</li>
- <li id="M201611280">
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
- <p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
+ <span class="inserted"><ins><em><li id="M201611280">
+ <p>The Uber</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>tracks</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+
+ <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>user's
+ consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>not enough
+to legitimize actions like this. At this point, most users have
+stopped reading</strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
massive surveillance.</p>
</li>
<li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a></em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em>investigated</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
-
- <p>Following is a non-exhaustive list, taken from</em></ins></span>
the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>research paper,</em></ins></span>
- of <span class="inserted"><ins><em>some proprietary VPN apps that
track</em></ins></span> users <span class="removed"><del><strong>is not
enough</strong></del></span> <span class="inserted"><ins><em>and infringe their
- privacy:</p>
-
- <dl class="compact">
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> users <span
class="removed"><del><strong>have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should
clearly</strong></del></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span> <span class="inserted"><ins><em>show them
targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
-of hiding</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+ research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>privacy</em></ins></span> and <span
class="removed"><del><strong>Conditions”</strong></del></span> <span
class="inserted"><ins><em>security of
+ 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>“in
spite</em></ins></span> of <span class="removed"><del><strong>hiding it in an
obscurely worded EULA.</p>
-<p>However,</strong></del></span> <span class="inserted"><ins><em>has
full access</em></ins></span> to <span class="removed"><del><strong>truly
protect people's privacy, we must prevent Google</strong></del></span> <span
class="inserted"><ins><em>users'
- text messages.</dd>
-
- <dt>DroidVPN</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in the first
+<p>However, to truly protect people's</strong></del></span> <span
class="inserted"><ins><em>the promises
+ for</em></ins></span> privacy, <span class="removed"><del><strong>we must
prevent Google</strong></del></span> <span
class="inserted"><ins><em>security,</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>anonymity
given by</em></ins></span> the <span class="removed"><del><strong>first
place!</p>
</li>
<li>
- <p>Google Play (a component of Android) <a
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>majority</em></ins></span> of <span
class="removed"><del><strong>Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span> <span
class="inserted"><ins><em>TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
- for other apps</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>also core system logs. TigerVPN developers have
- confirmed this.</dd>
+ tracks the users' movements without their permission</a>.</p>
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>UK government if requested.</dd>
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>VPN
+ apps—millions</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>users may be unawarely
subject</em></ins></span> to <span class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
+ <p>Following is</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
unthinkable with free software.</p>
</li>
- <li><p>More than 73%</strong></del></span>
- <span class="inserted"><ins><em>users. The stated
purpose</em></ins></span> of the <span class="removed"><del><strong>most
popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>JS
injection is to display ads. Uses
- roughly five tracking libraries. Also, it redirects the user's
- traffic through valueclick.com (an advertising website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ <li><p>More than 73% of</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the
<span class="removed"><del><strong>most popular Android</strong></del></span>
<span class="inserted"><ins><em>research paper,
+ of some proprietary VPN</em></ins></span> apps
+ <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>that track
users</em></ins></span> and <span class="removed"><del><strong>location
information</a> of</strong></del></span> <span
class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>users with third parties.</p>
</li>
- <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span class="inserted"><ins><em>this app have
confirmed that</em></ins></span>
- the <span class="removed"><del><strong>app's functionality,
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span>
+ <span class="inserted"><ins><em>privacy:</p>
+
+ <dl class="compact">
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</em></ins></span> to <span class="inserted"><ins><em>track users
and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>non-premium
version of</em></ins></span> the <span class="removed"><del><strong>500 most
popular gratis Android apps</a>.</p>
+ found in</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full access to users'
+ text messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear way to say
+ “free”—they are not free software. The clear
way</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>say
“zero price” is “gratis.”</p>
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection</em></ins></span> for
<span class="removed"><del><strong>granted that</strong></del></span>
- <span class="inserted"><ins><em>tracking</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>read logs</em></ins></span>
+ for <span class="removed"><del><strong>granted that the usual analytics
tools are
+ legitimate, but is that valid? Software</strong></del></span> <span
class="inserted"><ins><em>other apps and also core system logs.
TigerVPN</em></ins></span> developers have <span
class="removed"><del><strong>no right</strong></del></span>
+ <span class="inserted"><ins><em>confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
just as wrong as any other snooping.</p>
</li>
<li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>user</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
+ connect</strong></del></span> <span class="inserted"><ins><em>LinkedIn.
Also, it stores detailed logs and
+ may turn them over</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the UK government if requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
+ traffic through valueclick.com (an advertising website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>also uses
roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>user and displaying ads.</dd>
</dl></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
@@ -1529,64 +1530,87 @@
a server every phone number</strong></del></span>
<span class="inserted"><ins><em><li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="inserted"><ins><em>include <a
-
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>the user types into it</a>; the server
records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>include</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>receiving the code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201511190">
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511190">
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
+ unrelated to</em></ins></span> the <span class="inserted"><ins><em>app's
functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>server
records</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
+ found in the 500</em></ins></span> most popular <span
class="removed"><del><strong>iOS</strong></del></span> <span
class="inserted"><ins><em>gratis Android apps</a>.</p>
- <p>The article should not have described</em></ins></span> these
<span class="removed"><del><strong>numbers for at least 30
- days.</p>
+ <p>The article should not have described these</em></ins></span> apps
+ <span class="removed"><del><strong><a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>apps as
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>as
“free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
+ to <span class="removed"><del><strong>Apple's servers
all</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
- legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
- <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
- that snoop are just as wrong as any other
snooping.</p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>Around</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and</em></ins></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, from Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
- personal, behavioral and location information</a> of their users with
- third parties.</p>
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
+ legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span class="removed"><del><strong>date on all your
devices.
+ Any edits you make</strong></del></span>
+ <span class="inserted"><ins><em>analyze what users</em></ins></span> are
<span class="removed"><del><strong>automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>doing
or how. “Analytics” tools
+ that snoop are just as wrong as any other snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+ <li id="M201510300">
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location</em></ins></span> information</a>
<span class="removed"><del><strong>as accessed on 24 Sep 2015.) The iCloud
feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</strong></del></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
- <span class="inserted"><ins><em><li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all the
photos</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>some are starting
- to realize that it is nasty.</p>
+ <p>There</strong></del></span> <span class="inserted"><ins><em>their
users with
+ third parties.</p>
+ </li>
+
+ <li id="M201508210">
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>a way
to</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some are
starting
+ to realize that</em></ins></span> it <span
class="removed"><del><strong>still counts</strong></del></span> <span
class="inserted"><ins><em>is nasty.</p>
<p>This article shows the <a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that</em></ins></span> they <span
class="removed"><del><strong>make.</p>
+ twisted ways that they present snooping</em></ins></span> as a
+ <span class="removed"><del><strong>surveillance functionality.</p>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps</strong></del></span> <span class="inserted"><ins><em>present
snooping as a way to “serve”
+ <p>Unknown people apparently took advantage of
this</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span
class="inserted"><ins><em>“serve”
users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ typical example</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They needed to break
Apple's
+ security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>the attitude</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1595,156 +1619,167 @@
<li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found that 90% of the top-ranked gratis proprietary
- Android apps contained recognizable tracking libraries. For the paid
+ study</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>2015</a> found that 90% of</em></ins></span>
the <span class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>top-ranked gratis
proprietary
+ Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p>
+ </li>
+
+ <li><p>There is also a feature for web sites to track users,
which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That</strong></del></span> <span
class="inserted"><ins><em>paid
proprietary apps, it was only 60%.</p>
- <p>The article confusingly describes gratis apps as
- “free”, but most of</em></ins></span> them <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>are not in fact <a
- href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span
class="inserted"><ins><em>confusingly describes gratis apps as
+ “free”,</em></ins></span> but <span
class="removed"><del><strong>it
+ is still true</strong></del></span> <span class="inserted"><ins><em>most
of them are not</em></ins></span> in <span class="removed"><del><strong>iOS
7.)</p>
+ </li>
+
+ <li><p>The iThing</strong></del></span> <span
class="inserted"><ins><em>fact <a
+ href="/philosophy/free-sw.html">free software</a>.
It</em></ins></span> also
+ <span class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> <span class="inserted"><ins><em>uses the
+ ugly word “monetize”. A good replacement for</em></ins></span>
that <span class="removed"><del><strong>can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>word
+ is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
- <li id="M201505060">
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>100 <a
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
+ <p>Gratis Android apps (but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+ and advertising</a> URLs, on</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>average.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA</strong></del></span>
- <p>(From</strong></del></span> <span class="inserted"><ins><em>the
average.</p>
+ <span class="inserted"><ins><em><li id="M201504060">
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</em></ins></span> snoop on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it</strong></del></span> <span
class="inserted"><ins><em>user</a>. This</em></ins></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
</li>
- <li id="M201504060">
- <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>the
user</a>. This</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>in addition to
- the snooping done</em></ins></span> by the
- <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>phone company, and perhaps by the OS in
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>whether the app developers
- get users to say “I agree”. That</em></ins></span> is <span
class="inserted"><ins><em>no excuse for
+ <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>whether the app developers
+ get users</em></ins></span> to <span class="removed"><del><strong>exist
for</strong></del></span> <span class="inserted"><ins><em>say “I
agree”. That is</em></ins></span> no
+ <span class="removed"><del><strong>possible
purpose</strong></del></span> <span class="inserted"><ins><em>excuse for
malware.</p>
</li>
<li id="M201411260">
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in</em></ins></span> a way <span
class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not</em></ins></span>
- as <span class="inserted"><ins><em>bad as what the others do.</p>
+ report which</em></ins></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>apps</em></ins></span>
the <span class="inserted"><ins><em>user has installed.</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
+</ul>
- <li id="M201401150.1">
- <p>The Simeji keyboard is</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <li><p>Spyware in iThings:
- the</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
- </li>
+<ul>
+ <li><p>Tracking software</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</em></ins></span> in <span
class="removed"><del><strong>popular Android apps</strong></del></span> <span
class="inserted"><ins><em>a way that at least</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>visible</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
+ <li><p>Android tracks location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
+ as bad as what</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
- <span class="inserted"><ins><em><li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose</em></ins></span> is
<span class="removed"><del><strong>also a feature for web
sites</strong></del></span> to <span class="removed"><del><strong>track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS
6,</strong></del></span> <span class="inserted"><ins><em>restrict the
- use of data on the user's computer,</em></ins></span> but it
- <span class="removed"><del><strong>is still true in iOS 7.)</p>
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>others do.</p>
</li>
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p></em></ins></span>
+ <li id="M201401150.1">
+ <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use</em></ins></span> of data <span class="inserted"><ins><em>on the
user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
- <span class="inserted"><ins><em><li id="M201312060">
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</em></ins></span> for <span
class="inserted"><ins><em>use by companies</a>.</p>
-
- <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>state</a>.</p>
+ <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>get the user's list of other people's phone
+ numbers</a>.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the</strong></del></span> <span
class="inserted"><ins><em>user to
- approve sending personal</em></ins></span> data <span
class="removed"><del><strong>in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>to the app
developer but did not ask
- about sending</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ <li id="M201312060">
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</em></ins></span> by <span
class="inserted"><ins><em>companies</a>.</p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve</em></ins></span> sending <span
class="removed"><del><strong>hidden text messages which enable
them</strong></del></span> <span class="inserted"><ins><em>personal
data</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> the <span
class="removed"><del><strong>phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>app developer but did not ask
+ about sending it</em></ins></span> to <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>microphone, retrieve geo-location data from
the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>weakness of</em></ins></span>
+ the <span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> to
<span class="removed"><del><strong>exist for no
- possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
- the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
- surveillance: why should a flashlight app send any information to
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data that their transmission
is</strong></del></span>
+ <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>flashlight app
send any information to
anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
+ <p>FTC says most mobile apps</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>children don't respect privacy:</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201307110">
- <p>Skype contains</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span>
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ Microsoft changed Skype <a
+
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
</ul>
@@ -1757,383 +1792,331 @@
<ul class="blurbs">
<li id="M201806240">
- <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it to third parties</a>.</p>
+ <p>Red Shell is a spyware that</em></ins></span>
+ is <span class="inserted"><ins><em>found in many proprietary games.
It</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li id="M201804144">
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>users' computers</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> to <span class="removed"><del><strong>have
GPS.)</p></strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p></em></ins></span>
+ </li>
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>snoop on all
open processes running on its user's computer</a>.</p>
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804144">
+ <p>ArenaNet surreptitiously installed a spyware
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>restrict
+ the use of data on</strong></del></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>get the</strong></del></span> <span
class="inserted"><ins><em>snoop on all open processes running on
its</em></ins></span> user's <span class="removed"><del><strong>list of other
people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>computer</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <li id="M201711070">
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information</em></ins></span> to <span class="removed"><del><strong>turn
the phones</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+<ul>
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711070"></em></ins></span>
+ <p>The <span class="removed"><del><strong>moviepass app and
dis-service spy</strong></del></span> <span class="inserted"><ins><em>driver
for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</em></ins></span> on <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read the contact list. This
malware</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
+ video game consoles snoop</em></ins></span> on <span
class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>even more than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before</strong></del></span> and <span
class="removed"><del><strong>after going</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to <span
class="inserted"><ins><em>the
+ internet</a>—even what their users weigh.</p>
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p>
+ <p>A game console is</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
</li>
- <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
- <span class="inserted"><ins><em>a nonfree operating system.</p>
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span> <span
class="inserted"><ins><em>computer, and you can't trust a computer with
+ a nonfree operating system.</p></em></ins></span>
</li>
- <li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509160">
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
+ collect a wide range of data about their users</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
+ book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by</strong></del></span> <span
class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>data
+ <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="removed"><del><strong>this article
misuses</strong></del></span> <span
class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot</em></ins></span> of
<span class="removed"><del><strong>some
- kind.</p></li>
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ </li>
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
- use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <li>
+ <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what</strong></del></span> <span
class="inserted"><ins><em>manipulate</em></ins></span> people <span
class="removed"><del><strong>are listening</strong></del></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it
may</strong></del></span> <span class="inserted"><ins><em>buy things, and hunt
for
+ “whales” who can</em></ins></span> be <span
class="removed"><del><strong>analyzing people's conversations to serve them
with targeted
+ advertisements.</p>
</li>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games that cost money</em></ins></span>
- can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>led</em></ins></span> to <span
class="removed"><del><strong>do lots</strong></del></span> <span
class="inserted"><ins><em>spend a lot</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>money. They also
+ use a back door</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give
Verizon</strong></del></span> <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
+
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games,
games</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
+ they</strong></del></span> <span class="inserted"><ins><em>cost money
+ can</em></ins></span> use <span class="removed"><del><strong>its search
engine.</p>
+
+ <p>Currently,</strong></del></span> the <span
class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>same tactics.</p>
</li>
<li id="M201401280">
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
- to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span>
takes <span class="removed"><del><strong>effect. However, the
+ app remains spyware—an “optional” piece
of</strong></del></span> <span class="inserted"><ins><em>advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more</em></ins></span> spyware <span class="removed"><del><strong>is
+ still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA</em></ins></span> app <span
class="removed"><del><strong><a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
+ <li id="M200510200">
+ <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
- <span class="inserted"><ins><em><li id="M200510200">
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on
- <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to</strong></del></span> <span class="inserted"><ins><em>sniffs a
- good deal of personal data</a>, including lots of activities
which</em></ins></span>
- have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span> <span class="inserted"><ins><em>hidden
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies</em></ins></span> on <span class="removed"><del><strong>many sorts
of data in the phone,</strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="inserted"><ins><em>sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="inserted"><ins><em>people that</em></ins></span> use <span
class="removed"><del><strong>of data on</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
-
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
- </li>
-</ul>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>people
that use them</a>.</p>
-<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
-</div>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>inadequate as a protection against massive
+ surveillance.</p>
</li>
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
- <li><p>The Sarahah app</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+ <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.”
Evidently</em></ins></span> that <span
class="removed"><del><strong>include</strong></del></span> <span
class="inserted"><ins><em>was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email
addresses</a></strong></del></span>
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio
and</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>user's address
- book to developer's server. Note that this article
misuses</strong></del></span> the <span
class="inserted"><ins><em>own</em></ins></span> words
- <span class="removed"><del><strong>“<a
href="/philosophy/free-sw.html">free software</a>”
- referring to zero price.</p>
+ collect “whatever the</em></ins></span> TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>sees,”</a> in the own words of the
company's
+ CTO,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p>
</li>
- <li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>of</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
+ <li><p>Facebook's new Magic Photo app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span> <span
class="inserted"><ins><em>this data is sold to third parties. This is in
return</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,</strong></del></span>
+ <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?)</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p>
- </li>
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>share the picture you take</strong></del></span>
<span class="inserted"><ins><em>make this spying acceptable,</em></ins></span>
according to <span class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>him,
+ is that it</em></ins></span> is <span
class="inserted"><ins><em>opt-in</em></ins></span> in <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable,
according</em></ins></span> to <span class="removed"><del><strong>do lots of
surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span> <span
class="inserted"><ins><em>him,
- is that</em></ins></span> it <span class="removed"><del><strong>demands to
personal data</strong></del></span> <span class="inserted"><ins><em>is
opt-in</em></ins></span> in <span class="inserted"><ins><em>newer models. But
since</em></ins></span> the <span class="removed"><del><strong>device</a>.
- </p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>Vizio
software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>wire to Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
+ algorithms.</p></strong></del></span> <span
class="inserted"><ins><em>there is no guarantee that all future updates will
leave the
+ settings unchanged.</p></em></ins></span>
+
+ <p>If <span class="removed"><del><strong>so, none of Facebook users'
pictures are private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>you already own a Vizio smart TV (or any smart TV,
for that
+ matter),</em></ins></span> the <span class="removed"><del><strong>user
didn't “upload” them</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't spying on you
is</em></ins></span>
+ to <span class="inserted"><ins><em>disconnect it from</em></ins></span>
the <span class="removed"><del><strong>service.</p>
</li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some of its phones. The app</strong></del></span> <span
class="inserted"><ins><em>all future updates</em></ins></span> will <span
class="removed"><del><strong>give Verizon the same
- information about</strong></del></span> <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV,
for</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't
spying</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>you is
- to disconnect it from the Internet, and use a terrestrial antenna
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>Internet,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software),</em></ins></span>
and <span class="inserted"><ins><em>set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
+ if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>get
your own router (which can
+ be an old computer running completely free software),</em></ins></span>
and <span class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>set
up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>realize
that it is nasty.</p>
+
+ <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last
resort,
you can replace your TV with another model.</p>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>article for the
facts it presents. It
- is too bad that</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span>
- <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p>
- </li>
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>they present snooping as</strong></del></span>
<span class="inserted"><ins><em>install</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude of</strong></del></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
- <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>article</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
+ apps</strong></del></span> the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+ is <span class="removed"><del><strong>visible and
+ optional</a>. Not as</strong></del></span> <span
class="inserted"><ins><em>too</em></ins></span> bad <span
class="removed"><del><strong>as what</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
- <li><p>A pregnancy test controller application not only
- can</strong></del></span>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>article finishes
by advocating the
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
+ malware too</a>.</p></em></ins></span>
</li>
- <li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702060">
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
+ report everything that is viewed</em></ins></span> on <span
class="inserted"><ins><em>them, and not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>in addition to</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>user's own computer,</em></ins></span>
+ the <span class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>TV reports what it is.
The existence of a way to disable</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
+ does not legitimize</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ </li>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
- <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
- for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
- the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the</em></ins></span> surveillance.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511130">
- <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
- sounds to be picked up by proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>various sites
- such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>picked up</em></ins></span> by <span
class="removed"><del><strong>the question of whether the app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>proprietary
malware running
+ on other devices in range so as</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+ your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
<span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
- <span class="inserted"><ins><em>across devices.</p>
+ manufacturers in spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>the app developer</strong></del></span> <span
class="inserted"><ins><em>turn this off,</em></ins></span> but <span
class="removed"><del><strong>did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>having</em></ins></span> it <span
class="inserted"><ins><em>enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>company
- already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>private
- anymore, even if the user didn't “upload” them to the
service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>unaware
they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
- users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
- </li>
-
- <li id="M201507240">
- <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps the user has
- installed.</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
- record</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
- used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="removed"><del><strong>the
user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get</strong></del></span> <span
class="inserted"><ins><em>what</em></ins></span>
- users <span class="removed"><del><strong>to say “I agree”.
That is no excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized this app
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>another company,
Nuance</a>.
- Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> it to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
the
- <span class="removed"><del><strong>weakness of the
reject-it-if-you-dislike-snooping
+ to <span class="removed"><del><strong>other companies. This
shows</strong></del></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>600 millions social media
profiles</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>US or some
- other government.</p>
-
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>anyone? A</strong></del></span> <span
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
- software <span class="removed"><del><strong>flashlight
+ app send any</strong></del></span> <span
class="inserted"><ins><em>company
+ already monitors. Tivo customers are unaware they're
+ being watched by advertisers. By combining TV viewing</em></ins></span>
+ information <span class="removed"><del><strong>to anyone? A free software
flashlight
app would not.</p>
</li>
</ul>
@@ -2146,214 +2129,226 @@
<ul>
<li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
+ <p>A remote-control sex toy was found to make</strong></del></span>
<span class="inserted"><ins><em>with online social media participation, Tivo
can now</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two
users</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p></em></ins></span>
</li>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based</strong></del></span> in <span
class="removed"><del><strong>the U.S.</p>
+ <span class="removed"><del><strong><li>
+ <p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
+ can remotely control the toys with</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ </li>
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in
on a child's speech, and even speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>third
- parties</a>.</p></em></ins></span>
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops</em></ins></span> on <span class="removed"><del><strong>a child's
speech,</strong></del></span> <span class="inserted"><ins><em>what programs
people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
+ record</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A computerized vibrator</strong></del></span>
- <span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
- snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <span class="inserted"><ins><em><li id="M201504300">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
+ users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
</li>
- <li id="M201409290">
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <li id="M201502090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
+ Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
- <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
- better.</p>
+ <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>was surrounded</strong></del></span>
<span class="inserted"><ins><em>is done</em></ins></span> by <span
class="removed"><del><strong>a person's
+ body), as well as the vibration frequency.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than</strong></del></span> free
+ software <span class="removed"><del><strong>which users could have
+ checked and changed.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
- work.”</p>
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
+ <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
+ </li>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
+ <li id="M201409290">
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</em></ins></span> was <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>personal information about how
people used it</a>.</p>
- <p>The company's statement</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="inserted"><ins><em>transmission reports a 404 error
- really means nothing; the server could save that</em></ins></span> data
<span class="removed"><del><strong>may be
- true, but</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ better.</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em><a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <p>This shows</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
+ consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>are totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker,</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ work.”</p>
- <p>LG later said</em></ins></span> it had <span
class="removed"><del><strong>sold the data to</strong></del></span> <span
class="inserted"><ins><em>installed</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>figure out
- who the user was.</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
-
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to
<span class="removed"><del><strong>figure out
+ who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
+ user <span class="removed"><del><strong>was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>watches—no
exceptions!</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
<a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ manufacturer</a>. Guess what?</strong></del></span>
- <span class="inserted"><ins><em><li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>user
watches, and</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
conversations
+ <p>That</strong></del></span> <span class="inserted"><ins><em>switch
to turn this off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> could <span
class="removed"><del><strong>listen to these conversations
was unacceptable by itself.</p></li>
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul>
<li>
- <p>An LG “smart” watch is designed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
- long-term.</p>
-
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
-
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>someone else and</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>transmit
- conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+ <p>An LG “smart” watch is designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit
+ conversations too</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
<span class="inserted"><ins><em>save</em></ins></span> that <span
class="removed"><del><strong>connects to an unidentified site in
China</a>.</p>
+ <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>data anyway.)</p>
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
- </li>
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>back door,</strong></del></span> <span
class="inserted"><ins><em>patch to stop this,</em></ins></span> but <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>any
+ product</em></ins></span> could <span class="removed"><del><strong>be a
+ misunderstanding. However, it is certainly surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>spy this way.</p>
+
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201511250"></em></ins></span>
- <p>The <span class="removed"><del><strong>article says
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam
“smart” camera</em></ins></span> is <span
class="removed"><del><strong>a back door, but that could be a
- misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches</em></ins></span> it <span
class="inserted"><ins><em>“off.”</p>
-
- <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>using it
- to outsmart you.</p></em></ins></span>
- </li>
-</ul>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ <span class="inserted"><ins><em><li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
+ </li>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li><p></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+Note</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+
+ <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>“clean”
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
+puts</strong></del></span> <span class="inserted"><ins><em>to look at
what's</em></ins></span> in <span class="removed"><del><strong>its own
malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
+ security for your home. Security means making</em></ins></span> sure <span
class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2363,73 +2358,94 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>the code
could surely convert it
- into one.</p>
+ Shows</strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
- <li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
<p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span class="inserted"><ins><em>to outsmart
you.</p></em></ins></span>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+</div>
+
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
+ </li>
+
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of the conversation between two
users</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201703140">
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was surrounded by a person's
+ minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>statements about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
+ <p>The company's statement that it was anonymizing the data may be
true, but it doesn't really matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of
C$4m</a></em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
<div class="big-section">
@@ -2454,44 +2470,43 @@
is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing</strong></del></span>
+ <p>The article describes wrongdoing by</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a>
collected</em></ins></span> by the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span>
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>fact
+ that</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>device is tethered to a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But it also demonstrates that</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span class="removed"><del><strong>fact
- that</strong></del></span> <span class="inserted"><ins><em>manufacturer
and</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>FBI could listen
to these
- conversations was unacceptable by itself.</p>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span
class="removed"><del><strong>company
+ surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span> a <span
class="removed"><del><strong>server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it</strong></del></span> <span
class="inserted"><ins><em>speech recognition
- company based in the U.S.</p>
+ <span class="removed"><del><strong><li></strong></del></span>
- <p>Those toys</em></ins></span> also <span
class="removed"><del><strong>demonstrates that</strong></del></span> <span
class="inserted"><ins><em>contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>company
- surveillance capability.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
- </li>
+ <span class="inserted"><ins><em><li id="M201612060"></em></ins></span>
+ <p>The <span class="removed"><del><strong>Nest
Cam</strong></del></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
- <span class="removed"><del><strong><li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on children and adults</a>.</p></em></ins></span>
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p></em></ins></span>
</li>
</ul>
@@ -2504,24 +2519,25 @@
<span class="removed"><del><strong><ul>
<li><p>E-books can contain JavaScript code,
and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using a DJI drone
- to snoop</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
+ <li><p>Spyware in many e-readers—not only the
Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
they report even which page the user reads at what
time</a>.</p>
</li>
<li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ needed</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>snoop on
other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
</ul>
@@ -2539,30 +2555,52 @@
</li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201904240">
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
- voice assistants</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>similar things.</p>
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+ even if <span class="removed"><del><strong>it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span
class="removed"><del><strong>if it asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ <li id="M201904240">
+ <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="inserted"><ins><em><a
+ <p>Even if no one connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>cell phone
modem enables</strong></del></span> <span class="inserted"><ins><em>client
program is nonfree, and data processing is done
“<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
the <span class="removed"><del><strong>phone company</strong></del></span>
<span class="inserted"><ins><em>cloud</a>” (a soothing way of
saying “We won't
@@ -3415,7 +3453,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:55 $
+$Date: 2019/05/29 06:00:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary-surveillance.de.po 10 May 2019 17:02:55 -0000 1.287
+++ proprietary-surveillance.de.po 29 May 2019 06:00:57 -0000 1.288
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3985,6 +3985,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.427
retrieving revision 1.428
diff -u -b -r1.427 -r1.428
--- proprietary-surveillance.fr.po 10 May 2019 17:59:15 -0000 1.427
+++ proprietary-surveillance.fr.po 29 May 2019 06:00:57 -0000 1.428
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-05-10 19:58+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3395,6 +3396,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-surveillance.it-diff.html 10 May 2019 17:02:55 -0000
1.139
+++ proprietary-surveillance.it-diff.html 29 May 2019 06:00:57 -0000
1.140
@@ -1423,23 +1423,8 @@
<p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>side issue. What
the company does
with the data</em></ins></span> is <span class="removed"><del><strong>not
really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>a secondary issue. The principal wrong here is that
- the company gets that data</em></ins></span> at <span
class="removed"><del><strong>Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span
class="inserted"><ins><em>all.</p>
+puts</strong></del></span> <span class="inserted"><ins><em>a secondary issue.
The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1448,80 +1433,33 @@
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>emails
of members of Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>send the machine's “advertising ID,” so
that
- Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the app; others only say that the user is
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ account.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>Android</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location</em></ins></span> even when <span
class="inserted"><ins><em>users disable “location
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
+ <p>There are other ways to turn off the other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
@@ -2098,7 +2036,7 @@
<p>Vizio goes a step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
+ “smart” TVs analyze your viewing habits</em></ins></span> in
<span class="inserted"><ins><em>detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
@@ -2133,7 +2071,7 @@
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
+ used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2145,7 +2083,12 @@
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
- software in your own computer.</p>
+ software in your</em></ins></span> own <span
class="removed"><del><strong>malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
@@ -2173,19 +2116,36 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>report
what the
user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches,
and the switch to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
@@ -2199,85 +2159,72 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a</em></ins></span>
“smart” <span class="removed"><del><strong>device means the
manufacturer is using it</strong></del></span> <span
class="inserted"><ins><em>TV</a>
- and use its camera</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
+</ul>
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>video</em></ins></span> they <span
class="removed"><del><strong>report even</strong></del></span> <span
class="inserted"><ins><em>capture to Amazon
servers</a>,</em></ins></span> which <span
class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>save it
- long-term.</p>
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>video
shows everyone that comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
- <p>The article focuses on how Ring</em></ins></span> used
- <span class="removed"><del><strong>by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>let
individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ long-term.</p>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
+<div style="clear: left;"></div>
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+ video—Amazon expects society to surrender to.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because the system has no authentication when
- accessed through</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera”
would</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>a better
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
- security for your home. Security</em></ins></span> means <span
class="removed"><del><strong>it demands blind faith from its
users</a>.</p>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
- <span class="inserted"><ins><em>see through your camera.</p>
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>the videos.
That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
</li>
<li id="M201603220">
@@ -2286,161 +2233,224 @@
security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250">
+ <li id="M201511250"></em></ins></span>
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
+ even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
- listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
- <span class="inserted"><ins><em>into one.</p>
- </li>
-
- <li id="M201711100">
- <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
+ into one.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two
users</a>.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
- products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
- and
- <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article, is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
+ standard with which manufacturers would make statements about their
+ products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ and changed.</p>
+
+ <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems,</strong></del></span>
- <span class="inserted"><ins><em>true,</em></ins></span> but <span
class="inserted"><ins><em>it doesn't really matter. If it had
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>data to a data
- broker,</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
- user was.</p>
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>data
to a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>data broker would
have been able</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
<p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the company <span class="inserted"><ins><em>has been ordered to pay a
total of C$4m</a> to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
-
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
+ the <span class="removed"><del><strong>time; it is
possible</strong></del></span> <span class="inserted"><ins><em>company has been
ordered</em></ins></span> to <span class="removed"><del><strong>physically
remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a> to its
+ customers.</p></em></ins></span>
+ </li>
+
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
+
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>store it.</p>
+ conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
+ company <span class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>get the
data</strong></del></span> <span class="inserted"><ins><em>listen in on a
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>even speak
into</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span>
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ </li>
+</ul></em></ins></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
<ul>
<li><p>Nest thermometers
send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ lot of data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
-before Amazon “smart” TVs.</p>
+ <li id="M201905061">
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt), and sends
+ it</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see
you</strong></del></span> <span class="inserted"><ins><em>government agencies.
In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result,</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
<ul>
<li>
<p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-
-<ul class="blurbs">
<li id="M201904240">
<p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them,</strong></del></span>
@@ -3198,7 +3208,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:55 $
+$Date: 2019/05/29 06:00:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary-surveillance.it.po 10 May 2019 17:02:56 -0000 1.300
+++ proprietary-surveillance.it.po 29 May 2019 06:00:57 -0000 1.301
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3772,6 +3772,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary-surveillance.ja-diff.html 10 May 2019 17:02:56 -0000
1.149
+++ proprietary-surveillance.ja-diff.html 29 May 2019 06:00:58 -0000
1.150
@@ -2416,6 +2416,28 @@
</div>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201904240">
<p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
@@ -3056,7 +3078,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary-surveillance.ja.po 10 May 2019 17:02:56 -0000 1.273
+++ proprietary-surveillance.ja.po 29 May 2019 06:00:58 -0000 1.274
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3183,6 +3183,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-surveillance.pot 10 May 2019 17:02:56 -0000 1.221
+++ proprietary-surveillance.pot 29 May 2019 06:00:58 -0000 1.222
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2314,6 +2314,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\">
"
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a "
"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.524
retrieving revision 1.525
diff -u -b -r1.524 -r1.525
--- proprietary-surveillance.ru.po 12 May 2019 09:12:12 -0000 1.524
+++ proprietary-surveillance.ru.po 29 May 2019 06:00:58 -0000 1.525
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3354,6 +3355,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.de-diff.html 18 May 2019 08:29:45 -0000 1.94
+++ proprietary.de-diff.html 29 May 2019 06:00:58 -0000 1.95
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,17 +126,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -186,6 +186,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -231,25 +253,6 @@
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
-
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of the Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary.de.po 18 May 2019 08:29:45 -0000 1.136
+++ proprietary.de.po 29 May 2019 06:00:58 -0000 1.137
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -498,32 +522,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary.es.po 19 May 2019 09:37:47 -0000 1.166
+++ proprietary.es.po 29 May 2019 06:00:58 -0000 1.167
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -394,46 +419,6 @@
"desconectando el módem del celular o envolviendo la antena con papel de "
"aluminio?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Algunas de las órdenes del usuario al servicio Alexa son <a href=\"https://"
-"www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
-"someone-is-20190411-p51d4g.html\">grabadas por empleados de Amazon para su "
-"escucha</a>. Los asistentes de voz de Google y Apple hacen cosas similares."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Una parte del personal encargado de Alexa tiene acceso incluso a <a href="
-"\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-"
-"home-addresses-1.1248788\">la localización y otros datos personales</a>"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Dado que el programa cliente no es libre, y que el procesamiento de los "
-"datos se hace «<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">en
"
-"la nube</a>» (una expresión tranquilizadora que significa: «No te diremos "
-"cómo ni dónde se hace»), los usuarios no tienen forma de saber qué sucede
"
-"con las grabaciones a menos que algún empleado <a href=\"https://www."
-"bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
-"eavesdroppers-1.1243033\">rompa sus acuerdos de confidencialidad</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,6 +498,46 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www."
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Algunas de las órdenes del usuario al servicio Alexa son <a href="
+#~ "\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-"
+#~ "sometimes-someone-is-20190411-p51d4g.html\">grabadas por empleados de "
+#~ "Amazon para su escucha</a>. Los asistentes de voz de Google y Apple hacen "
+#~ "cosas similares."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-"
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Una parte del personal encargado de Alexa tiene acceso incluso a <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-"
+#~ "customers-home-addresses-1.1248788\">la localización y otros datos "
+#~ "personales</a>"
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>” (a soothing way of saying “We won't tell you how and "
+#~ "where it's done”), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg."
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Dado que el programa cliente no es libre, y que el procesamiento de los "
+#~ "datos se hace «<a href=\"/philosophy/words-to-avoid.html#CloudComputing"
+#~ "\">en la nube</a>» (una expresión tranquilizadora que significa: «No te
"
+#~ "diremos cómo ni dónde se hace»), los usuarios no tienen forma de saber "
+#~ "qué sucede con las grabaciones a menos que algún empleado <a href="
+#~ "\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
+#~ "eavesdroppers-1.1243033\">rompa sus acuerdos de confidencialidad</a>."
+
+#~ msgid ""
#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.fr.po 18 May 2019 12:25:57 -0000 1.205
+++ proprietary.fr.po 29 May 2019 06:00:58 -0000 1.206
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-05-18 14:23+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -389,48 +414,6 @@
"connexion en débranchant le modem, ou bien en enveloppant l'antenne dans du "
"papier d'aluminium?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Certaines commandes envoyées par l'utilisateur au service Alexa sont <a
href="
-"\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-"
-"sometimes-someone-is-20190411-p51d4g.html\">enregistrées pour que les "
-"employés d'Amazon puissent les écouter</a>. Les assistants vocaux de Google
"
-"et Apple font à peu près la même chose."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Une partie du personnel d'Alexa a même accès à la <a href=\"https://www."
-"bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\">géolocalisation et autres données personnelles</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Puisque le programme client n'est pas libre et que le traitement des données
"
-"se fait « <a href=\"/philosophy/words-to-avoid.html#CloudComputing\">dans
le "
-"nuage</a> » (une expression rassurante signifiant « On ne veut pas vous
dire "
-"où et comment cela se fait »), les utilisateurs n'ont aucun moyen de
savoir "
-"ce qui arrive aux enregistrements, sauf si l'un des humains indiscrets <a "
-"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
-"eavesdroppers-1.1243033\">rompt l'accord de confidentialité</a> qu'il a "
-"signé."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,3 +487,43 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www."
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Certaines commandes envoyées par l'utilisateur au service Alexa sont <a "
+#~ "href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-"
+#~ "to-us-sometimes-someone-is-20190411-p51d4g.html\">enregistrées pour que "
+#~ "les employés d'Amazon puissent les écouter</a>. Les assistants vocaux de
"
+#~ "Google et Apple font à peu près la même chose."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-"
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Une partie du personnel d'Alexa a même accès à la <a
href=\"https://www."
+#~ "bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+#~ "addresses-1.1248788\">géolocalisation et autres données
personnelles</a>."
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>” (a soothing way of saying “We won't tell you how and "
+#~ "where it's done”), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg."
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Puisque le programme client n'est pas libre et que le traitement des "
+#~ "données se fait « <a
href=\"/philosophy/words-to-avoid.html#CloudComputing"
+#~ "\">dans le nuage</a> » (une expression rassurante signifiant « On ne
veut "
+#~ "pas vous dire où et comment cela se fait »), les utilisateurs n'ont
aucun "
+#~ "moyen de savoir ce qui arrive aux enregistrements, sauf si l'un des "
+#~ "humains indiscrets <a href=\"https://www.bnnbloomberg.ca/three-cheers-for-"
+#~ "amazon-s-human-eavesdroppers-1.1243033\">rompt l'accord de "
+#~ "confidentialité</a> qu'il a signé."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.it-diff.html 18 May 2019 08:29:45 -0000 1.106
+++ proprietary.it-diff.html 29 May 2019 06:00:58 -0000 1.107
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -230,25 +252,6 @@
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
-
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of the Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.it.po 18 May 2019 08:29:45 -0000 1.145
+++ proprietary.it.po 29 May 2019 06:00:58 -0000 1.146
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -502,32 +526,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.ja-diff.html 18 May 2019 08:29:45 -0000 1.107
+++ proprietary.ja-diff.html 29 May 2019 06:00:58 -0000 1.108
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -182,6 +182,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -227,25 +249,6 @@
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
-
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of the Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
</ul></em></ins></span>
@@ -306,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.ja.po 18 May 2019 08:29:45 -0000 1.128
+++ proprietary.ja.po 29 May 2019 06:00:58 -0000 1.129
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -420,32 +444,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.nl-diff.html 18 May 2019 08:29:45 -0000 1.106
+++ proprietary.nl-diff.html 29 May 2019 06:00:58 -0000 1.107
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -230,25 +252,6 @@
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
-
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of the Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.nl.po 18 May 2019 08:29:45 -0000 1.117
+++ proprietary.nl.po 29 May 2019 06:00:58 -0000 1.118
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -495,32 +519,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.pl-diff.html 18 May 2019 08:29:45 -0000 1.124
+++ proprietary.pl-diff.html 29 May 2019 06:00:58 -0000 1.125
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -129,9 +129,9 @@
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -183,6 +183,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -228,25 +250,6 @@
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
-
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of the Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary.pl.po 18 May 2019 08:29:45 -0000 1.112
+++ proprietary.pl.po 29 May 2019 06:00:58 -0000 1.113
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -578,32 +602,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.pot 18 May 2019 08:29:45 -0000 1.109
+++ proprietary.pot 29 May 2019 06:00:58 -0000 1.110
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a "
+"href=\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php\">
"
+"the data remain on other servers</a>, where they can be accessed by "
+"advertising companies and government agencies. In other words, deleting the "
+"collected information doesn't cancel the wrong of collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips "
+"Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos "
+"speakers are likewise stored longer than necessary on the servers the "
+"devices are tethered to. Moreover, they are made available to Alexa. As a "
+"result, Amazon has a very precise picture of users' life at home, not only "
+"in the present, but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a "
"href=\"https://boingboing.net/2019/05/15/brittle-security.html\"> sitting "
"ducks for other attackers</a>, and the app censorship prevents security "
@@ -307,32 +330,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a "
-"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\">
"
-"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
-"assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a "
-"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\">
"
-"location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
-"cloud</a>” (a soothing way of saying “We won't tell you how and "
-"where it's done”), users have no way to know what happens to the "
-"recordings unless human eavesdroppers <a "
-"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\">
"
-"break their non-disclosure agreements</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.pt-br.po 21 May 2019 12:00:19 -0000 1.168
+++ proprietary.pt-br.po 29 May 2019 06:00:58 -0000 1.169
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-05-20 00:20-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -296,6 +297,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -385,47 +410,6 @@
"Se você possui um desses carros, conseguiu quebrar a conectividade "
"desconectando o modem celular ou envolvendo a antena em papel alumÃnio?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"Alguns dos comandos dos usuários para o serviço Alexa são <a
href=\"https://"
-"www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
-"someone-is-20190411-p51d4g.html\"> gravados para que os funcionários da "
-"Amazon ouçam</a>. Os assistentes de voz do Google e da Apple fazem coisas "
-"semelhantes."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"Uma fração da equipe de atendimento do Alexa tem acesso a <a
href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> locais e outros dados pessoais</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"Como o programa cliente não é livre, e o processamento de dados é feito
â<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">na nuvem</a>â (uma "
-"maneira tranquilizadora de dizer ânão vamos lhe dizer como e onde é
feitoâ), "
-"os usuários não têm como saber o que acontece com as gravações, a menos
que "
-"espiões humanos <a href=\"https://www.bnnbloomberg.ca/three-cheers-for-"
-"amazon-s-human-eavesdroppers-1.1243033\"> quebrem seus acordos de não "
-"divulgação</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,6 +485,45 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www."
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "Alguns dos comandos dos usuários para o serviço Alexa são <a href="
+#~ "\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-"
+#~ "sometimes-someone-is-20190411-p51d4g.html\"> gravados para que os "
+#~ "funcionários da Amazon ouçam</a>. Os assistentes de voz do Google e da "
+#~ "Apple fazem coisas semelhantes."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-"
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "Uma fração da equipe de atendimento do Alexa tem acesso a <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-"
+#~ "customers-home-addresses-1.1248788\"> locais e outros dados pessoais</a>."
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>” (a soothing way of saying “We won't tell you how and "
+#~ "where it's done”), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg."
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "Como o programa cliente não é livre, e o processamento de dados é feito
"
+#~ "â<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">na nuvem</"
+#~ "a>â (uma maneira tranquilizadora de dizer ânão vamos lhe dizer como e
"
+#~ "onde é feitoâ), os usuários não têm como saber o que acontece com as
"
+#~ "gravações, a menos que espiões humanos <a
href=\"https://www.bnnbloomberg."
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> quebrem "
+#~ "seus acordos de não divulgação</a>."
+
+#~ msgid ""
#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary.ru.po 18 May 2019 08:59:41 -0000 1.242
+++ proprietary.ru.po 29 May 2019 06:00:58 -0000 1.243
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-29 05:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -392,46 +417,6 @@
"ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе одним из ÑÑиÑ
авÑомобилей, ÑдалоÑÑ Ð»Ð¸ вам ÑазоÑваÑÑ "
"Ñоединение, оÑклÑÑив ÑоÑовÑй модем или
обеÑнов анÑÐµÐ½Ð½Ñ Ð² ÑолÑгÑ?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-"ÐекоÑоÑÑе из полÑзоваÑелÑÑкиÑ
команд
ÑлÑÐ¶Ð±Ñ Alexa <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> запиÑÑвалиÑÑ Ð´Ð»Ñ
подÑлÑÑÐ¸Ð²Ð°Ð½Ð¸Ñ ÑабоÑниками "
-"Amazon</a>. Ðодобное Ð´ÐµÐ»Ð°ÐµÑ Ð¸ голоÑоваÑ
поддеÑжка Google и Apple."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-"ЧаÑÑÑ ÑоÑÑÑдников ÑлÑÐ¶Ð±Ñ Alexa даже имееÑ
доÑÑÑп к <a href=\"https://www."
-"bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> меÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
пеÑÑоналÑнÑм даннÑм</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-"ÐоÑколÑÐºÑ Ð¿ÑогÑамма-ÐºÐ»Ð¸ÐµÐ½Ñ Ð½ÐµÑвободна, а
обÑабоÑка даннÑÑ
пÑоÑ
Ð¾Ð´Ð¸Ñ “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">в
облаке</a>” "
-"(Ñак они мÑгко говоÑÑÑ “Ð¼Ñ Ð²Ð°Ð¼ не
ÑаÑÑкажем, как и где ÑÑо "
-"делаеÑÑÑ”), полÑзоваÑели не могÑÑ
ÑзнаÑÑ, ÑÑо пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ñ Ð·Ð°Ð¿Ð¸ÑÑми, "
-"еÑли ÑолÑко лÑди, коÑоÑÑе подÑлÑÑиваÑÑ, не
<a href=\"https://www."
-"bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> "
-"наÑÑÑÐ°Ñ Ñвой Ð´Ð¾Ð³Ð¾Ð²Ð¾Ñ Ð¾ неÑазглаÑении</a>."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -511,6 +496,45 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Some of users' commands to the Alexa service are <a href=\"https://www."
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> recorded for Amazon employees to "
+#~ "listen to</a>. The Google and Apple voice assistants do similar things."
+#~ msgstr ""
+#~ "ÐекоÑоÑÑе из полÑзоваÑелÑÑкиÑ
команд
ÑлÑÐ¶Ð±Ñ Alexa <a href=\"https://www."
+#~ "smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-"
+#~ "someone-is-20190411-p51d4g.html\"> запиÑÑвалиÑÑ Ð´Ð»Ñ
подÑлÑÑÐ¸Ð²Ð°Ð½Ð¸Ñ "
+#~ "ÑабоÑниками Amazon</a>. Ðодобное Ð´ÐµÐ»Ð°ÐµÑ Ð¸
голоÑÐ¾Ð²Ð°Ñ Ð¿Ð¾Ð´Ð´ÐµÑжка Google и "
+#~ "Apple."
+
+#~ msgid ""
+#~ "A fraction of the Alexa service staff even has access to <a href="
+#~ "\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-"
+#~ "customers-home-addresses-1.1248788\"> location and other personal data</"
+#~ "a>."
+#~ msgstr ""
+#~ "ЧаÑÑÑ ÑоÑÑÑдников ÑлÑÐ¶Ð±Ñ Alexa даже имееÑ
доÑÑÑп к <a href=\"https://www."
+#~ "bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+#~ "addresses-1.1248788\"> меÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
пеÑÑоналÑнÑм даннÑм</a>."
+
+#~ msgid ""
+#~ "Since the client program is nonfree, and data processing is done “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+#~ "a>” (a soothing way of saying “We won't tell you how and "
+#~ "where it's done”), users have no way to know what happens to the "
+#~ "recordings unless human eavesdroppers <a href=\"https://www.bnnbloomberg."
+#~ "ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their "
+#~ "non-disclosure agreements</a>."
+#~ msgstr ""
+#~ "ÐоÑколÑÐºÑ Ð¿ÑогÑамма-ÐºÐ»Ð¸ÐµÐ½Ñ Ð½ÐµÑвободна,
а обÑабоÑка даннÑÑ
пÑоÑ
Ð¾Ð´Ð¸Ñ “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#CloudComputing\">в
облаке</"
+#~ "a>” (Ñак они мÑгко говоÑÑÑ “Ð¼Ñ Ð²Ð°Ð¼ не
ÑаÑÑкажем, как и где "
+#~ "ÑÑо делаеÑÑÑ”), полÑзоваÑели не могÑÑ
ÑзнаÑÑ, ÑÑо пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ñ "
+#~ "запиÑÑми, еÑли ÑолÑко лÑди, коÑоÑÑе
подÑлÑÑиваÑÑ, не <a href=\"https://"
+#~ "www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
+#~ "eavesdroppers-1.1243033\"> наÑÑÑÐ°Ñ Ñвой Ð´Ð¾Ð³Ð¾Ð²Ð¾Ñ Ð¾
неÑазглаÑении</a>."
+
+#~ msgid ""
#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.zh-tw-diff.html 18 May 2019 08:29:45 -0000 1.84
+++ proprietary.zh-tw-diff.html 29 May 2019 06:00:58 -0000 1.85
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,17 +126,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -186,6 +186,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -231,25 +253,6 @@
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
-
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of the Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since the client program is nonfree, and data processing is done
- “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:45 $
+$Date: 2019/05/29 06:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.zh-tw.po 18 May 2019 08:29:45 -0000 1.95
+++ proprietary.zh-tw.po 29 May 2019 06:00:59 -0000 1.96
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-05-29 05:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
"a>, and the app censorship prevents security companies from figuring out how "
@@ -409,32 +433,6 @@
"aluminum foil?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
-"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
-"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
-"The Google and Apple voice assistants do similar things."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"A fraction of the Alexa service staff even has access to <a href=\"https://"
-"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
-"addresses-1.1248788\"> location and other personal data</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the client program is nonfree, and data processing is done “<a "
-"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
-"a>” (a soothing way of saying “We won't tell you how and where "
-"it's done”), users have no way to know what happens to the recordings "
-"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-"
-"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
-"disclosure agreements</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- pt-br.po 21 May 2019 12:00:19 -0000 1.116
+++ pt-br.po 29 May 2019 06:01:00 -0000 1.117
@@ -334,6 +334,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- ru.po 28 May 2019 11:03:21 -0000 1.193
+++ ru.po 29 May 2019 06:01:00 -0000 1.194
@@ -424,6 +424,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
@@ -982,18 +1006,19 @@
"a>, and the app censorship prevents security companies from figuring out how "
"those attacks work."
msgstr ""
-"ÐолÑзоваÑели, пойманнÑе в ÑÑÑÑмÑ
ай-ÑÑÐ´Ð¸Ñ — <a href=\"https://boingboing."
-"net/2019/05/15/brittle-security.html\"> подÑаднÑе ÑÑки длÑ
дÑÑгиÑ
злоÑмÑÑленников</a>, "
-"а ÑензÑÑа пÑиложений не позволÑеÑ
компаниÑм по безопаÑноÑÑи вÑÑÑнÑÑÑ, как "
-"они взламÑваÑÑ ÑÑÑÑойÑÑва."
+"ÐолÑзоваÑели, пойманнÑе в ÑÑÑÑмÑ
ай-ÑÑÐ´Ð¸Ñ — <a href=\"https://"
+"boingboing.net/2019/05/15/brittle-security.html\"> подÑаднÑе
ÑÑки Ð´Ð»Ñ Ð´ÑÑгиÑ
"
+"злоÑмÑÑленников</a>, а ÑензÑÑа пÑиложений
не позволÑÐµÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñм по "
+"безопаÑноÑÑи вÑÑÑнÑÑÑ, как они взламÑваÑÑ
ÑÑÑÑойÑÑва."
#. type: Content of: <ul><li><p>
msgid ""
"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
"even if it didn't lead to security threats as well."
msgstr ""
-"ЦензÑÑа пÑиложений Ñо ÑÑоÑÐ¾Ð½Ñ Apple
неÑпÑаведлива в пÑинÑипе, и ÑÑо нелÑÐ·Ñ Ð±Ñло
Ð±Ñ "
-"извиниÑÑ, даже еÑли из-за ÑÑого не
возникали Ð±Ñ ÐµÑе и ÑгÑÐ¾Ð·Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи."
+"ЦензÑÑа пÑиложений Ñо ÑÑоÑÐ¾Ð½Ñ Apple
неÑпÑаведлива в пÑинÑипе, и ÑÑо нелÑÐ·Ñ "
+"бÑло Ð±Ñ Ð¸Ð·Ð²Ð¸Ð½Ð¸ÑÑ, даже еÑли из-за ÑÑого не
возникали Ð±Ñ ÐµÑе и ÑгÑÐ¾Ð·Ñ "
+"безопаÑноÑÑи."
#. type: Content of: <ul><li><p>
msgid ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- zh-tw.po 18 May 2019 08:29:46 -0000 1.88
+++ zh-tw.po 29 May 2019 06:01:00 -0000 1.89
@@ -334,6 +334,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Amazon Alexa collects a lot more information from users than is necessary "
+"for correct functioning (time, location, recordings made without a "
+"legitimate prompt), and sends it to Amazon's servers, which store it "
+"indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, "
+"even if users request deletion of their data from Amazon's servers, <a href="
+"\"https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-"
+"you-this-whole-13822095.php\"> the data remain on other servers</a>, where "
+"they can be accessed by advertising companies and government agencies. In "
+"other words, deleting the collected information doesn't cancel the wrong of "
+"collecting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Data collected by devices such as the Nest thermostat, the Philips Hue-"
+"connected lights, the Chamberlain MyQ garage opener and the Sonos speakers "
+"are likewise stored longer than necessary on the servers the devices are "
+"tethered to. Moreover, they are made available to Alexa. As a result, Amazon "
+"has a very precise picture of users' life at home, not only in the present, "
+"but in the past (and, who knows, in the future too?)"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some of users' commands to the Alexa service are <a href=\"https://www.smh."
"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/18
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=