[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 7 Jun 2019 04:33:56 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/06/07 04:33:55
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.437&r2=1.438
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.531&r2=1.532
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.92&r2=1.93
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- de.po 2 Jun 2019 17:01:05 -0000 1.93
+++ de.po 7 Jun 2019 08:33:52 -0000 1.94
@@ -1720,6 +1720,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- es.po 3 Jun 2019 09:02:55 -0000 1.125
+++ es.po 7 Jun 2019 08:33:52 -0000 1.126
@@ -1509,6 +1509,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- fr.po 2 Jun 2019 17:32:44 -0000 1.161
+++ fr.po 7 Jun 2019 08:33:52 -0000 1.162
@@ -1466,6 +1466,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- it.po 2 Jun 2019 17:01:05 -0000 1.93
+++ it.po 7 Jun 2019 08:33:52 -0000 1.94
@@ -1705,6 +1705,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- ja.po 2 Jun 2019 17:01:05 -0000 1.92
+++ ja.po 7 Jun 2019 08:33:53 -0000 1.93
@@ -1454,6 +1454,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-apple.de-diff.html 18 May 2019 08:29:44 -0000 1.34
+++ malware-apple.de-diff.html 7 Jun 2019 08:33:53 -0000 1.35
@@ -571,45 +571,54 @@
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
solely to</strong></del></span> <span class="inserted"><ins><em>point
that</em></ins></span> Apple <span
class="removed"><del><strong>services</a> by being designed
to</strong></del></span> <span class="inserted"><ins><em>should
not</em></ins></span> be <span class="removed"><del><strong>incompatible
with all
-other options, ethical</strong></del></span> <span
class="inserted"><ins><em>allowed to censor apps. Even if Apple carried out
this act of
+other options, ethical or unethical.</p>
+</li>
+
+<li>
+<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means
+of converting them</strong></del></span> <span
class="inserted"><ins><em>allowed</em></ins></span> to <span
class="removed"><del><strong>or from Open Document Formats</a>. iWork
formats
+have changed several times since they were first introduced. This
may</strong></del></span> <span class="inserted"><ins><em>censor apps. Even if
Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
- about either of these questions,</em></ins></span> or <span
class="removed"><del><strong>unethical.</p></strong></del></span> <span
class="inserted"><ins><em>any other.</p></em></ins></span>
+ the real issue. Apple should not</em></ins></span> have
+<span class="removed"><del><strong>had</strong></del></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>power to impose its views
+ about either</em></ins></span> of <span
class="removed"><del><strong>thwarting <a
+href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
+efforts</a>, thus preventing free software from fully supporting
them.</p>
+
+<p>iWork formats are considered <a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
+unfit for document preservation</a>.</p></strong></del></span>
<span class="inserted"><ins><em>these questions, or any
other.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means</strong></del></span>
+<p>In MacOS</strong></del></span>
<span class="inserted"><ins><em><li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>Apple's arbitrary and inconsistent
censorship</a>.</p>
+ More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>iOS,</strong></del></span> <span
class="inserted"><ins><em>inconsistent censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>or from Open Document Formats</a>.
iWork formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Apple used this censorship power in 2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>iThings for a time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>procedure</strong></del></span> <span
class="inserted"><ins><em>iThings</em></ins></span> for <span
class="inserted"><ins><em>a time. It also</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
+converting images from</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed the
locations</em></ins></span>
- of <span class="removed"><del><strong>thwarting</strong></del></span>
<span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>Photos format</a></strong></del></span>
<span class="inserted"><ins><em>locations
+ of US drone assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection,
Apple</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat">reverse
engineering
-efforts</a>, thus preventing free software from fully supporting
them.</p>
-
-<p>iWork formats</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
@@ -619,35 +628,28 @@
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns”</em></ins></span> are <span
class="removed"><del><strong>considered</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users, or make option settings hard
- to find</a>.</p>
-
- <p>This allows a company such as Apple to say, “We allow users
- to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ <p>“Dark patterns” are <a
+
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed to mislead users, or make option settings
hard</em></ins></span>
+ to <span class="inserted"><ins><em>find</a>.</p>
+
+ <p>This allows</em></ins></span> a <span
class="removed"><del><strong>free format is so tedious
+and time-consuming that</strong></del></span> <span
class="inserted"><ins><em>company such as Apple to say, “We
allow</em></ins></span> users <span
class="removed"><del><strong>just</strong></del></span>
+ <span class="inserted"><ins><em>to turn this off” while ensuring
that few will understand how
+ to actually turn it off.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p>In MacOS and iOS,</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="pressuring">Apple Pressuring</h3>
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of</em></ins></span> the <span
class="removed"><del><strong>procedure for</strong></del></span> <span
class="inserted"><ins><em>software. This section reports examples of hard sell
and other unjust commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
<li id="M201510270">
- <p>Apple Siri</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
-converting images from the Photos format</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
- to <span class="removed"><del><strong>a free format is so tedious
-and time-consuming that users just</strong></del></span> give <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>you information</a> about music
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot
of them.</p></strong></del></span> <span class="inserted"><ins><em>you're
not an Apple
+ <p>Apple Siri <a
+
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
+ to</em></ins></span> give <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>you information</a> about music
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot
of them.</p></strong></del></span> <span class="inserted"><ins><em>you're
not an Apple
Music subscriber.</p></em></ins></span>
</li>
</ul>
@@ -720,13 +722,13 @@
<span class="inserted"><ins><em><li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains</em></ins></span> DRM <span
class="removed"><del><strong>that caters</strong></del></span> <span
class="inserted"><ins><em>specifically designed</em></ins></span> to <span
class="removed"><del><strong>Bluray disks</a>.
(The</strong></del></span> <span class="inserted"><ins><em><a
+ iPhone 7 contains</em></ins></span> DRM <span
class="removed"><del><strong>that caters</strong></del></span> <span
class="inserted"><ins><em>specifically designed</em></ins></span> to <span
class="removed"><del><strong>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em><a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The</em></ins></span> article <span
class="removed"><del><strong>focused on Windows
- and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>same thing subsequently.)</p></li>
+ <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>same thing subsequently.)</p></li>
</ul>
<h3 id="jails">Apple Jails</h3>
@@ -784,8 +786,7 @@
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
deleted from iPods</em></ins></span> the <span
class="removed"><del><strong>iThing jail:</strong></del></span> <span
class="inserted"><ins><em>music that</em></ins></span> users <span
class="removed"><del><strong>can now install apps built</strong></del></span>
<span class="inserted"><ins><em>had got</em></ins></span> from
<span class="removed"><del><strong>source code, provided the source code is
written in Swift. Users
-cannot do this freely because they are required to identify
-themselves.</strong></del></span> <span class="inserted"><ins><em>internet
music
+cannot do</strong></del></span> <span class="inserted"><ins><em>internet music
stores that competed with iTunes</a>.</p>
</li>
@@ -794,9 +795,9 @@
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
- not approved by</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.apple.com/xcode/">Here
-are details</a>. While</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All</em></ins></span> this <span
class="removed"><del><strong>is a crack in</strong></del></span> <span
class="inserted"><ins><em>was apparently intentional.</p>
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All</em></ins></span> this <span
class="removed"><del><strong>freely because they are required to identify
+themselves.</strong></del></span> <span class="inserted"><ins><em>was
apparently intentional.</p>
</li>
</ul>
@@ -804,50 +805,60 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul class="blurbs">
- <li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS, <a
+ <li id="M201906030">
+ <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.apple.com/xcode/">Here</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they</em></ins></span> are <span
class="removed"><del><strong>details</a>. While
this</strong></del></span> <span
class="inserted"><ins><em>suspended</a>.</p>
+
+ <p>This distributed bluetooth network</em></ins></span> is <span
class="removed"><del><strong>a crack in the prison walls,</strong></del></span>
<span class="inserted"><ins><em>said to be
+ “secure,” but</em></ins></span> it is <span
class="removed"><del><strong>not
+big enough to mean that the iThings are no longer jails.</p>
+
+<h4>Examples of censorship by</strong></del></span> <span
class="inserted"><ins><em>obviously <em>not</em> secure
from</em></ins></span>
+ Apple <span class="removed"><del><strong>jails</h4>
+<ul>
+ <li>
+ <p>Apple <a
+
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+ deleted several VPNs</strong></del></span> <span
class="inserted"><ins><em>or</em></ins></span> from <span
class="removed"><del><strong>its app store for China</a>, thus using
+ its own censorship power to strengthen</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>of</strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
+ as</em></ins></span> the <span class="removed"><del><strong>Chinese
+ government.</p></strong></del></span> <span
class="inserted"><ins><em>US and China).</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Apple is <a
+
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
+ censoring apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809070">
+ <p>Adware Doctor, an ad blocker</em></ins></span> for <span
class="inserted"><ins><em>MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
- the <span class="removed"><del><strong>prison walls,</strong></del></span>
<span class="inserted"><ins><em>user's browsing history</a>.</p>
+ the <span class="removed"><del><strong>US government too</a>.
Specifically, it
+ is deleting apps developed by Iranians.</p></strong></del></span>
<span class="inserted"><ins><em>user's browsing history</a>.</p>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>is not
-big enough</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201711250"></em></ins></span>
+ <p>The <span class="removed"><del><strong>root of these wrongs are
in Apple. If Apple had not designed</strong></del></span> <span
class="inserted"><ins><em>DMCA and</em></ins></span> the <span
class="removed"><del><strong>iMonsters</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>mean
that</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
+ illegal</em></ins></span> to <span class="removed"><del><strong>let Apple
censor applications,</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the <span
class="inserted"><ins><em>latest</em></ins></span> iThings <span
class="removed"><del><strong>are no longer jails.</p>
-
-<h4>Examples of censorship by Apple jails</h4>
-<ul>
- <li>
- <p>Apple</strong></del></span> <span
class="inserted"><ins><em>system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
- deleted several VPNs from its app store</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>China</a>, thus using
- its own censorship power</strong></del></span> <span
class="inserted"><ins><em>you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>strengthen that of the Chinese
- government.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
+ them off—only until 5am. That's</em></ins></span> Apple <span
class="inserted"><ins><em>for you—“We
+ know you want to be spied on”.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702150"></em></ins></span>
- <p>Apple <span class="removed"><del><strong>is</strong></del></span>
<span class="inserted"><ins><em>proposes</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps for the US government too</a>. Specifically, it
- is deleting apps developed by Iranians.</p>
- <p>The root of these wrongs are in Apple. If Apple had not designed
- the iMonsters</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>let Apple censor applications,
Apple</strong></del></span> <span class="inserted"><ins><em>use it without
having your fingerprints taken. Users</em></ins></span> would <span
class="removed"><del><strong>not</strong></del></span> have
+ <li id="M201702150">
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users</em></ins></span>
would <span class="removed"><del><strong>not</strong></del></span> have
<span class="removed"><del><strong>had</strong></del></span>
<span class="inserted"><ins><em>no way to tell whether</em></ins></span>
the <span class="removed"><del><strong>power</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
@@ -1158,7 +1169,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- malware-apple.de.po 18 May 2019 08:29:44 -0000 1.129
+++ malware-apple.de.po 7 Jun 2019 08:33:53 -0000 1.130
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1089,6 +1089,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-apple.es.po 19 May 2019 09:38:11 -0000 1.135
+++ malware-apple.es.po 7 Jun 2019 08:33:53 -0000 1.136
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -908,6 +909,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.fr.po 18 May 2019 12:25:57 -0000 1.142
+++ malware-apple.fr.po 7 Jun 2019 08:33:53 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-05-18 14:23+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -910,6 +911,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-apple.it-diff.html 18 May 2019 08:29:44 -0000 1.42
+++ malware-apple.it-diff.html 7 Jun 2019 08:33:53 -0000 1.43
@@ -407,62 +407,62 @@
<h3 id="insecurity">Apple Insecurity</h3>
-<p>These bugs are/were not intentional, so unlike</strong></del></span>
<span class="inserted"><ins><em>services</a>.</p>
+<p>These bugs are/were not intentional, so unlike the rest
of</strong></del></span> <span
class="inserted"><ins><em>services</a>.</p>
</li>
<li id="M201506250">
<p>Apple has banned iThing
- applications that show</em></ins></span> the <span
class="removed"><del><strong>rest</strong></del></span> <span
class="inserted"><ins><em>confederate flag. <a
+ applications that show</em></ins></span> the <span
class="removed"><del><strong>file
+ they do not count</strong></del></span> <span
class="inserted"><ins><em>confederate flag. <a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it as a symbol</em></ins></span> of <span
class="inserted"><ins><em>racism</a>, but even
- strategic games that use it to represent confederate army units
- fighting in</em></ins></span> the <span class="removed"><del><strong>file
- they do</strong></del></span> <span class="inserted"><ins><em>Civil
War.</p>
+ Not only those that use it</em></ins></span> as <span
class="removed"><del><strong>malware. We mention them</strong></del></span>
<span class="inserted"><ins><em>a symbol of racism</a>, but even
+ strategic games that use it</em></ins></span> to <span
class="removed"><del><strong>refute</strong></del></span> <span
class="inserted"><ins><em>represent confederate army units
+ fighting in</em></ins></span> the
+ <span class="removed"><del><strong>supposition</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
- <p>This ludicrous rigidity illustrates the point that Apple
should</em></ins></span>
- not <span class="removed"><del><strong>count as malware. We mention
them</strong></del></span> <span class="inserted"><ins><em>be
allowed</em></ins></span> to <span
class="removed"><del><strong>refute</strong></del></span> <span
class="inserted"><ins><em>censor apps. Even if Apple carried out this act of
- censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are
not</em></ins></span>
- the
- <span class="removed"><del><strong>supposition that prestigious proprietary
software doesn't</strong></del></span> <span class="inserted"><ins><em>real
issue. Apple should not</em></ins></span> have <span
class="removed"><del><strong>grave
+ <p>This ludicrous rigidity illustrates the point</em></ins></span>
that <span class="removed"><del><strong>prestigious proprietary software
doesn't have grave
bugs.</p>
<ul>
<li>
- <p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>the
power</em></ins></span> to <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from</strong></del></span> <span
class="inserted"><ins><em>impose its views
- about either of these questions, or</em></ins></span> any <span
class="removed"><del><strong>application which uses</strong></del></span> <span
class="inserted"><ins><em>other.</p>
+ <p>A vulnerability in Apple's Image I/O API</strong></del></span>
<span class="inserted"><ins><em>Apple should
+ not be</em></ins></span> allowed <span class="removed"><del><strong>an
attacker</strong></del></span> to <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses</strong></del></span> <span
class="inserted"><ins><em>censor apps. Even if Apple carried
out</em></ins></span> this <span
class="removed"><del><strong>API</strong></del></span> <span
class="inserted"><ins><em>act of
+ censorship with some care, it would still be wrong. Whether racism
+ is bad, whether educating people about drone attacks is bad, are not
+ the real issue. Apple should not have the power</em></ins></span> to
<span class="removed"><del><strong>render
+ a certain kind</strong></del></span> <span
class="inserted"><ins><em>impose its views
+ about either</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these questions, or any
other.</p></em></ins></span>
</li>
- <li id="M201412110">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used</em></ins></span> this <span
class="removed"><del><strong>API</strong></del></span> <span
class="inserted"><ins><em>censorship power in 2014</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Apple used this censorship power</em></ins></span> in <span
class="inserted"><ins><em>2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for</em></ins></span> a
<span class="removed"><del><strong>certain kind of image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned a game about growing marijuana</a>, while permitting games
+ ban all bitcoin apps</a> for</em></ins></span> the iThings <span
class="removed"><del><strong>Messages
+ app</strong></del></span> <span class="inserted"><ins><em>for a time.
It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ banned</em></ins></span> a <span class="removed"><del><strong>malicious
web site to extract all</strong></del></span> <span
class="inserted"><ins><em>game about growing marijuana</a>, while
permitting games
about other crimes such as killing people. Perhaps Apple considers
- killing more acceptable than marijuana.</p></em></ins></span>
+ killing more acceptable than marijuana.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201402070">
+ <li id="M201402070">
<p>Apple rejected an app that displayed the locations
of US drone assassinations, giving various excuses. Each
- time</em></ins></span> the <span class="removed"><del><strong>iThings
Messages
- app</strong></del></span> <span class="inserted"><ins><em>developers
fixed one “problem”, Apple
- complained about another. After the fifth rejection,
Apple</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>app based
on the subject matter</a>.</p></em></ins></span>
+ time the developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted it was censoring the app based on</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>subject
matter</a>.</p></em></ins></span>
</li>
</ul>
@@ -576,30 +576,31 @@
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>The Apple Music client
+ program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
+ the user's file system for music files, copies them to an Apple
+ server, and deletes them</a>.</p>
+ </li>
+
+ <li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201606080">
+ <span class="inserted"><ins><em><li id="M201606080"></em></ins></span>
<p>Apple <a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></em></ins></span>
stops users from fixing the security bugs in Quicktime for
Windows</a>,
- while refusing to fix them itself.</p>
+ while refusing to fix them <span
class="removed"><del><strong>itself.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p>
</li>
- <li id="M201605040"></em></ins></span>
- <p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ <li id="M201605040">
+ <p>The Apple Music client program <a
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
the user's file system for music files, copies them to an Apple server,
- and deletes them</a>.</p>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Apple <a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops users from fixing the security bugs in Quicktime for
- Windows</a>, while refusing to fix them itself.</p>
+ and deletes them</a>.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201602050"></em></ins></span>
<p>iOS version 9 for iThings <a
@@ -637,20 +638,32 @@
censorship</a>. All this was apparently intentional.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
- </li></strong></del></span>
-</ul>
+ <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id="surveillance">Apple Surveillance</h3>
-<span class="removed"><del><strong><ul>
+
+<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span class="removed"><del><strong>iPods the
music that users had got</strong></del></span>
+ <span class="inserted"><ins><em>Apple or</em></ins></span> from <span
class="removed"><del><strong>internet music
+ stores</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
+ as the US and China).</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
<li><p>Apple</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201809070">
+ <span class="inserted"><ins><em><li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
@@ -1021,7 +1034,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-apple.it.po 18 May 2019 08:29:44 -0000 1.123
+++ malware-apple.it.po 7 Jun 2019 08:33:53 -0000 1.124
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1117,6 +1117,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-apple.ja-diff.html 18 May 2019 08:29:44 -0000 1.53
+++ malware-apple.ja-diff.html 7 Jun 2019 08:33:53 -0000 1.54
@@ -325,9 +325,9 @@
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
themselves. <a href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is a crack in the prison walls, it is not
+are details</a>. While this is</em></ins></span> a <span
class="inserted"><ins><em>crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
@@ -362,8 +362,8 @@
</li>
<li id="M201701064">
- <p>Apple used its censorship system to enforce Russian surveillance
<a
-
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ <p>Apple used its censorship</em></ins></span> system <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
@@ -429,10 +429,10 @@
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Apple used this censorship power in 2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for</em></ins></span> a
<span class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ ban all bitcoin apps</a> for the iThings for a time. It also <a
+
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
@@ -502,21 +502,22 @@
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they</strong></del></span>
<span class="inserted"><ins><em>month</a>.</p>
+ Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
- <p>This evidently has to do with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command
to</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span> to
<span class="inserted"><ins><em>block
Telegram in Russia.</p>
<p>The Telegram client is free software on other platforms, but not
on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they</em></ins></span>
- are <span class="removed"><del><strong>technical</strong></del></span>
<span class="inserted"><ins><em>jails</a>, they don't permit any app to
be free software.</p>
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
+ are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes the file system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ changes</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+ to APFS</a>, which
cannot be
+ accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
</li>
<li id="M201706060">
@@ -524,10 +525,12 @@
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span>
<span class="inserted"><ins><em>stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
- </li>
+ <p>Meanwhile,</em></ins></span> Apple <span
class="inserted"><ins><em>stops people from fixing problems themselves;
+ that's the nature of proprietary</em></ins></span> software.</p>
+
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em></li>
<li id="M201704070">
<p id="iphone7-sabotage">The
@@ -537,7 +540,7 @@
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
- to describe the DRM, but we prefer</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="inserted"><ins><em>term <a
+ to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
@@ -545,10 +548,7 @@
<li id="M201606080">
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops</em></ins></span> users <span class="removed"><del><strong>of
specific Apple software.</p>
-
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>from fixing
the security bugs in Quicktime for Windows</a>,
+ stops users from fixing the security bugs in Quicktime for
Windows</a>,
while refusing to fix them itself.</p>
</li>
@@ -604,20 +604,32 @@
censorship</a>. All this was apparently intentional.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
- </li></strong></del></span>
-</ul>
+ <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id="surveillance">Apple Surveillance</h3>
-<span class="removed"><del><strong><ul>
+
+<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span class="removed"><del><strong>iPods the
music that users had got</strong></del></span>
+ <span class="inserted"><ins><em>Apple or</em></ins></span> from <span
class="removed"><del><strong>internet music
+ stores</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
+ as the US and China).</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
<li><p>iPhones</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201809070">
+ <span class="inserted"><ins><em><li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
@@ -980,7 +992,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- malware-apple.ja.po 18 May 2019 08:29:44 -0000 1.104
+++ malware-apple.ja.po 7 Jun 2019 08:33:53 -0000 1.105
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -912,6 +912,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.nl-diff.html 18 May 2019 08:29:44 -0000 1.59
+++ malware-apple.nl-diff.html 7 Jun 2019 08:33:53 -0000 1.60
@@ -325,9 +325,9 @@
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
themselves. <a href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is a crack in the prison walls, it is not
+are details</a>. While this is</em></ins></span> a <span
class="inserted"><ins><em>crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
@@ -362,8 +362,8 @@
</li>
<li id="M201701064">
- <p>Apple used its censorship system to enforce Russian surveillance
<a
-
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ <p>Apple used its censorship</em></ins></span> system <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
@@ -429,10 +429,10 @@
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Apple used this censorship power in 2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for</em></ins></span> a
<span class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ ban all bitcoin apps</a> for the iThings for a time. It also <a
+
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
@@ -502,21 +502,22 @@
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they</strong></del></span>
<span class="inserted"><ins><em>month</a>.</p>
+ Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
- <p>This evidently has to do with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command
to</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span> to
<span class="inserted"><ins><em>block
Telegram in Russia.</p>
<p>The Telegram client is free software on other platforms, but not
on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they</em></ins></span>
- are <span class="removed"><del><strong>technical</strong></del></span>
<span class="inserted"><ins><em>jails</a>, they don't permit any app to
be free software.</p>
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
+ are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes the file system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ changes</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+ to APFS</a>, which
cannot be
+ accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
</li>
<li id="M201706060">
@@ -524,10 +525,12 @@
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span>
<span class="inserted"><ins><em>stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
- </li>
+ <p>Meanwhile,</em></ins></span> Apple <span
class="inserted"><ins><em>stops people from fixing problems themselves;
+ that's the nature of proprietary</em></ins></span> software.</p>
+
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em></li>
<li id="M201704070">
<p id="iphone7-sabotage">The
@@ -537,7 +540,7 @@
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
- to describe the DRM, but we prefer</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="inserted"><ins><em>term <a
+ to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
@@ -545,10 +548,7 @@
<li id="M201606080">
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops</em></ins></span> users <span class="removed"><del><strong>of
specific Apple software.</p>
-
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>from fixing
the security bugs in Quicktime for Windows</a>,
+ stops users from fixing the security bugs in Quicktime for
Windows</a>,
while refusing to fix them itself.</p>
</li>
@@ -604,20 +604,32 @@
censorship</a>. All this was apparently intentional.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
- </li></strong></del></span>
-</ul>
+ <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id="surveillance">Apple Surveillance</h3>
-<span class="removed"><del><strong><ul>
+
+<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span class="removed"><del><strong>iPods the
music that users had got</strong></del></span>
+ <span class="inserted"><ins><em>Apple or</em></ins></span> from <span
class="removed"><del><strong>internet music
+ stores</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
+ as the US and China).</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
<li><p>iPhones</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201809070">
+ <span class="inserted"><ins><em><li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
@@ -980,7 +992,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:29:44 $
+$Date: 2019/06/07 08:33:53 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.nl.po 18 May 2019 08:29:44 -0000 1.59
+++ malware-apple.nl.po 7 Jun 2019 08:33:53 -0000 1.60
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -922,6 +922,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-apple.pot 18 May 2019 08:29:44 -0000 1.71
+++ malware-apple.pot 7 Jun 2019 08:33:53 -0000 1.72
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -636,6 +636,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a "
+"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\"> track "
+"iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a "
"href=\"https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history\">reports
"
"the user's browsing history</a>."
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- malware-apple.ru.po 18 May 2019 08:59:41 -0000 1.197
+++ malware-apple.ru.po 7 Jun 2019 08:33:53 -0000 1.198
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-18 08:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
#. type: Content of: <title>
msgid ""
@@ -901,6 +902,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- nl.po 2 Jun 2019 17:01:05 -0000 1.93
+++ nl.po 7 Jun 2019 08:33:53 -0000 1.94
@@ -1414,6 +1414,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- pl.po 2 Jun 2019 17:01:05 -0000 1.93
+++ pl.po 7 Jun 2019 08:33:53 -0000 1.94
@@ -1151,6 +1151,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- pot 2 Jun 2019 17:01:05 -0000 1.92
+++ pot 7 Jun 2019 08:33:53 -0000 1.93
@@ -1013,6 +1013,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-surveillance.de-diff.html 2 Jun 2019 17:01:05 -0000
1.76
+++ proprietary-surveillance.de-diff.html 7 Jun 2019 08:33:53 -0000
1.77
@@ -646,7 +646,12 @@
to
<span class="removed"><del><strong>users' text messages.</dd>
- <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN
developers</strong></del></span> have <span
class="removed"><del><strong>confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>GPS.)</p>
</li>
</ul>
@@ -657,28 +662,33 @@
</div>
<ul class="blurbs">
- <li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said</em></ins></span> to
<span class="removed"><del><strong>LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>be
+ “secure,” but</em></ins></span> it <span
class="removed"><del><strong>stores detailed logs
+ and may turn them over to</strong></del></span> <span
class="inserted"><ins><em>is obviously <em>not</em> secure from
+ Apple or from governments that can command Apple's obedience (such
+ as</em></ins></span> the <span class="removed"><del><strong>UK government
if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
+ <dd>Injects JavaScript code into</strong></del></span> <span
class="inserted"><ins><em>US and China).</p>
+ </li>
+
+ <li id="M201711250">
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>HTML pages returned</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
+ this would require circumventing</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the
- <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
- “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>JS injection is</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
+ <p>In</em></ins></span> the <span class="removed"><del><strong>JS
injection is</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
@@ -764,23 +774,24 @@
<p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>Android apps can collude to transmit users'
personal
data</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span>
+ tens of thousands</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
- security to get at them, but NSA can access any</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>pairs
that collude</a>.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
+ security to get at them, but NSA can access any</em></ins></span> of <span
class="removed"><del><strong>users that install the app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ </li>
-<p>Merely asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ <li id="M201409220">
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>“consent” of users
is</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
<p>This may have improved with <a
@@ -837,12 +848,14 @@
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
- to it.</p></em></ins></span>
- </li>
+place!</p>
+</li>
- <span class="removed"><del><strong><li></strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <li>
+ <p>Google Play (a</strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
+ to it.</p>
+ </li>
+</ul>
<div class="big-subsection">
@@ -851,11 +864,8 @@
</div>
<ul class="blurbs">
- <li id="M201904130"></em></ins></span>
- <p>Google <span class="removed"><del><strong>Play (a component of
Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"></strong></del></span>
tracks the <span class="removed"><del><strong>users'</strong></del></span>
movements <span class="removed"><del><strong>without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>of Android phones,</em></ins></span> and <span
class="removed"><del><strong>location</strong></del></span> <span
class="inserted"><ins><em>sometimes <a
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
@@ -892,11 +902,11 @@
</li>
<li id="M201609140">
- <p>Google Play (a component of Android) <a
+ <p>Google Play (a</em></ins></span> component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location</em></ins></span>
tracking, you must
+ <p>Even if you disable Google Maps and location tracking, you must
disable Google Play itself to completely stop the tracking. This is
yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
@@ -1278,81 +1288,83 @@
<p>It shows</em></ins></span> that
<span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span> <span class="inserted"><ins><em>no
one</em></ins></span> can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span class="inserted"><ins><em>trust a nonfree
program, not even</em></ins></span> the <span class="removed"><del><strong>GPS
and microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ the FBI</strong></del></span> <span class="inserted"><ins><em>no
one</em></ins></span> can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span class="inserted"><ins><em>trust a nonfree
program, not even</em></ins></span> the <span class="removed"><del><strong>GPS
and microphone in</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how</em></ins></span> Android
+ <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>apps use</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>The nonfree Snapchat app's principal purpose is to
restrict
- the</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps</em></ins></span> use <span class="inserted"><ins><em>and
- misuse users' personal data</a>. As</em></ins></span> of <span
class="removed"><del><strong>data on</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>user's
computer, but it does surveillance
- too:</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>get the user's list of</strong></del></span> other
<span class="removed"><del><strong>people's phone
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>hardware
identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="inserted"><ins><em>in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>take action. This proves
+ that</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer, but it
does</strong></del></span> <span class="inserted"><ins><em>a development
platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
+ <li id="M201902060">
+ <p>Many nonfree apps have a</em></ins></span> surveillance
+ <span class="removed"><del><strong>too:</strong></del></span> <span
class="inserted"><ins><em>feature for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
numbers.</a></p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
<ul>
<li>
- <p>The moviepass app</strong></del></span> <span
class="inserted"><ins><em>companies,</em></ins></span> and <span
class="removed"><del><strong>dis-service spy on users even more than users
- expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ <p>The moviepass app and dis-service spy</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ </li>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="inserted"><ins><em>take action. This proves
- that the policies of</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be</em></ins></span> on <span class="removed"><del><strong>users
even</strong></del></span> <span class="inserted"><ins><em>Google Play had one
or</em></ins></span> more <span class="removed"><del><strong>than users
+ expected. It</strong></del></span> <span
class="inserted"><ins><em>malicious functionalities, such as</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>after going to a movie</a>.
</p>
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
+ <p>Don't be tracked — pay cash!</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>have a surveillance feature for</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
- book</strong></del></span> <span class="inserted"><ins><em>often
malicious ads on users, and redirecting
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span> <span
class="inserted"><ins><em>often malicious ads on users,</em></ins></span> and
<span class="removed"><del><strong>email addresses</a> in user's address
+ book</strong></del></span> <span class="inserted"><ins><em>redirecting
them</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note</strong></del></span> <span class="inserted"><ins><em>phishing
sites</em></ins></span> that <span class="removed"><del><strong>this article
misuses</strong></del></span> <span class="inserted"><ins><em>stole their
credentials. Furthermore,</em></ins></span>
the <span class="removed"><del><strong>words
“<a href="/philosophy/free-sw.html">free
software</a>”
@@ -1466,11 +1478,11 @@
all conversations</a>.</p>
</li>
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
+ <li><p>Apps</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ track the phones of users</em></ins></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
</li>
<li id="M201808030">
@@ -1528,9 +1540,9 @@
their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
- are starting</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+ demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span
class="removed"><del><strong>submit</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting to realize that it is nasty.</p>
<p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
Android by</em></ins></span> <a
@@ -1611,27 +1623,23 @@
<p>Google</em></ins></span> did not
<span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary,</em></ins></span> it
- <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="inserted"><ins><em>prevent that, and deleted these apps after
+ <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and
deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
- <p>On the</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
- therefore shares in</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>responsibility for the injustice of their being
+ <p>On</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="inserted"><ins><em>preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
- the source code somehow</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>determine whether they mistreat users in
- various ways. If it did</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information to anyone? A free software
flashlight</strong></del></span> <span class="inserted"><ins><em>good job of
this, it could more or less
- prevent such snooping, except when the</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
+ <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p>
</li>
</ul>
@@ -1643,9 +1651,13 @@
<ul>
<li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>conversation between two</strong></del></span>
<span class="inserted"><ins><em>checking.</p>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span>
to <span class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>see what they
do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job</em></ins></span> of <span
class="inserted"><ins><em>this, it could more or less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
@@ -1655,9 +1667,9 @@
<li id="M201705230">
<p>Apps for BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on</em></ins></span> users</a>.</p>
+ snoop on users</a>.</p>
- <span class="inserted"><ins><em><p>With free software apps, users
could <em>make sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
@@ -3459,7 +3471,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/02 17:01:05 $
+$Date: 2019/06/07 08:33:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- proprietary-surveillance.de.po 2 Jun 2019 17:01:05 -0000 1.291
+++ proprietary-surveillance.de.po 7 Jun 2019 08:33:53 -0000 1.292
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1236,6 +1236,19 @@
msgstr " "
#. type: Content of: <ul><li><p>
+msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | The DMCA and the EU Copyright Directive make it <a
# | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\">
# | illegal to study how iOS [-cr...apps-] {+cr…apps+} spy on
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.437
retrieving revision 1.438
diff -u -b -r1.437 -r1.438
--- proprietary-surveillance.fr.po 3 Jun 2019 07:54:28 -0000 1.437
+++ proprietary-surveillance.fr.po 7 Jun 2019 08:33:53 -0000 1.438
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-06-02 19:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -902,6 +903,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
"cr…apps spy on users</a>, because this would require circumventing "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary-surveillance.it-diff.html 2 Jun 2019 17:01:06 -0000
1.143
+++ proprietary-surveillance.it-diff.html 7 Jun 2019 08:33:54 -0000
1.144
@@ -634,9 +634,20 @@
disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ to <span class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p>
+
</li>
-</ul>
+
+ <li><p>More than 73% of the most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to the app's functionality,
+ was</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -645,63 +656,50 @@
</div>
<ul class="blurbs">
- <li id="M201711250">
- <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a
thing</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this</em></ins></span> would <span class="removed"><del><strong>be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>require circumventing the iOS
DRM.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In</em></ins></span> the <span class="removed"><del><strong>most
popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ <li id="M201906030">
+ <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The
clear</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced</em></ins></span>
way <span class="removed"><del><strong>to say
- “zero price” is “gratis.”</p>
+ “free”—they</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they</em></ins></span> are <span
class="removed"><del><strong>not free software. The clear way to say
+ “zero price”</strong></del></span> <span
class="inserted"><ins><em>suspended</a>.</p>
+
+ <p>This distributed bluetooth network</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>really does turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>you—“We
- know you want</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate,</strong></del></span> <span class="inserted"><ins><em>said to be
+ “secure,”</em></ins></span> but <span
class="inserted"><ins><em>it</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers have no right to
+ analyze what users are doing</strong></del></span> <span
class="inserted"><ins><em>obviously <em>not</em> secure from
+ Apple</em></ins></span> or <span class="removed"><del><strong>how.
“Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>from governments</em></ins></span> that <span
class="removed"><del><strong>snoop are
+ just as wrong</strong></del></span> <span class="inserted"><ins><em>can
command Apple's obedience (such</em></ins></span>
+ as <span class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span class="inserted"><ins><em>the
US and China).</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Gratis Android apps
(but not</strong></del></span>
- <span class="inserted"><ins><em><li id="M201702150">
- <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
connect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>use it without
having your fingerprints taken. Users would have
- no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>phone</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>snooping on them.</p>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy</em></ins></span> on
<span class="inserted"><ins><em>users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span>
- <li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
- <li><p>Some manufacturers add a
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a
<a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
@@ -729,16 +727,24 @@
</div>
<ul>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is snooping on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of</em></ins></span> personal data to Apple's servers</a>. Big
Brother can get
+ <li><p>Apple proposes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
+ <p>Apple proposes</em></ins></span> <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
+ — which</strong></del></span> <span
class="inserted"><ins><em>screen</a>—which</em></ins></span> would
mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ </li>
+
+ <li id="M201611170">
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -890,158 +896,106 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904130">
<p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes <a
+ on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span> <span class="inserted"><ins><em>sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location</strong></del></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible for
sending</em></ins></span>
- the <span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812060">
- <p>Facebook's app got “consent” to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what</em></ins></span> the <span class="removed"><del><strong>user,
clearly must constitute spying of some
- kind.</p></li>
+ saves the data for years</a>.</p>
- <li><p>A Motorola</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ <p>Nonfree software in the phone has</em></ins></span> to <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="inserted"><ins><em>to Google.</p>
</li>
- <li id="M201811230">
- <p>An Android</em></ins></span> phone
- <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>location data while</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that</strong></del></span>
- <span class="inserted"><ins><em>airplane mode. Instead,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span class="removed"><del><strong>GPS
and microphone in Android
- phones</strong></del></span> <span
class="inserted"><ins><em>data,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>sent them</em></ins></span> all <span
class="removed"><del><strong>new portable phones
- to have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>later</a>.</p></em></ins></span>
+ <li id="M201812060">
+ <p>Facebook's app got “consent” to <a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is to restrict
- the use of data on the user's computer, but it does surveillance
- too:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711210">
- <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
when</em></ins></span>
- the <span class="removed"><del><strong>user's list of other
people's</strong></del></span> phone
- <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
<span class="inserted"><ins><em>has no SIM
card</a>.</p></em></ins></span>
+ <li id="M201811230">
+ <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
+ in airplane mode. It didn't send the location data while in
+ airplane mode. Instead, <a
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ </li>
+
+ <li id="M201711210">
+ <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears to do</strong></del></span>
- <span class="inserted"><ins><em><li id="M201611150">
+ <li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</strong></del></span>
data <span class="removed"><del><strong>in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p></em></ins></span>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140">
- <p>Google Play (a component</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
- information about</strong></del></span> <span
class="inserted"><ins><em>Android) <a
+ <li id="M201609140">
+ <p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the users' <span
class="removed"><del><strong>searches that</strong></del></span> <span
class="inserted"><ins><em>movements without their
permission</a>.</p>
-
- <p>Even if you disable</em></ins></span> Google <span
class="removed"><del><strong>normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>Maps</em></ins></span> and <span
class="removed"><del><strong>the
- user</strong></del></span> <span class="inserted"><ins><em>location
tracking, you</em></ins></span> must <span
class="removed"><del><strong>explicitly opt-in before the app takes effect.
However,</strong></del></span>
- <span class="inserted"><ins><em>disable Google Play itself to completely
stop</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>tracking. This</em></ins></span> is
- <span class="removed"><del><strong>still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
+ tracks the users' movements without their permission</a>.</p>
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span>
- <span class="inserted"><ins><em>yet another example</em></ins></span> of
<span class="removed"><del><strong>data in</strong></del></span> <span
class="inserted"><ins><em>nonfree software pretending to obey the user,
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung</em></ins></span> phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ of some
+ <span class="removed"><del><strong>kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>kind.</p></em></ins></span>
</li>
- <li id="M201403120">
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
+ Journal (in</em></ins></span> an article blocked from us by a paywall)
reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li id="M201307280">
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
- <li id="M201307250">
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
listens for voice all the time</a>.</p>
@@ -1052,14 +1006,16 @@
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
+ hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1067,37 +1023,58 @@
<li id="M201111170">
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.
+ </p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li id="M201410080">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</em></ins></span> of <span class="removed"><del><strong>its
phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>data to Adobe</a>. Adobe's
“excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -1114,19 +1091,33 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
+ makes</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1135,206 +1126,378 @@
<ul class="blurbs">
<li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users
post</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>users,
too,</em></ins></span> as <span class="removed"><del><strong>Facebook, Google+
and Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
- <p>This app is a spyware that can snoop on a lot of
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
+ the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
+
+ <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
+ available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can
easily</em></ins></span> be
+ <span class="removed"><del><strong>sent across</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
+ these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+ free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>you is
available from</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows the</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
+ a <span class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="inserted"><ins><em>being developed</a>.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
+ <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span> <span
class="inserted"><ins><em>huge number</em></ins></span> of
+ <span class="removed"><del><strong>the attitude of the proprietary
software industry towards
+ those they</strong></del></span> <span class="inserted"><ins><em><a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
+ preinstalled nonfree apps that</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary</strong></del></span> <span
class="inserted"><ins><em>access to sensitive data without
+ users' knowledge</a>. These hidden</em></ins></span> apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>may either call
home with
+ the data, or pass it on to user-installed</em></ins></span> apps <span
class="inserted"><ins><em>that have access to
the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ surveillance on which</em></ins></span> the user has
+ <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>doing this</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span>
+ <span class="inserted"><ins><em>lengthy terms of service</em></ins></span>
that <span class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>are difficult to understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>not
sufficient to legitimize snooping.</p></em></ins></span>
</li>
- <li id="M201902230">
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
+ library</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies
built</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="inserted"><ins><em>Facebook as well.</p>
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company,</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
<li id="M201902140">
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>perhaps by the OS
in the
+ phone.</p>
+
+ <p>Don't be distracted by</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ 18,000 (23%</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>total) link
this ID</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201902060">
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>interacting
with the app.</p>
</li>
<li id="M201902041.1">
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads
on users, and redirecting</em></ins></span>
+ them to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>companies, and the NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
+ potentially also be used</em></ins></span> to spy <span
class="removed"><del><strong>through it too</a>.
+ Here's information</strong></del></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk about “free
+ <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>NSA app
spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ <span class="inserted"><ins><em><li id="M201901050"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ a speech recognition company based in</strong></del></span> the <span
class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>users of what it will do</em></ins></span>
+ with <span class="inserted"><ins><em>the data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
+ with the data is</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
+ into</strong></del></span> <span class="inserted"><ins><em>secondary
issue. The principal wrong here is that</em></ins></span>
+ the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ tracking people's locations.</p></em></ins></span>
</li>
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span class="removed"><del><strong>its users
through</strong></del></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
+
+ <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>same machine via
+ various apps. Some</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed</em></ins></span>
information about <span class="removed"><del><strong>how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span>
+ <span class="inserted"><ins><em>the user's activities in the app; others
only say</em></ins></span> that <span class="removed"><del><strong>it was
anonymizing</strong></del></span> the <span class="removed"><del><strong>data
may be
+ true,</strong></del></span> <span class="inserted"><ins><em>user is
+ using that app,</em></ins></span> but <span
class="removed"><del><strong>it doesn't really matter. If it had sold the data
to a
+ data broker, the data broker would have been able to figure out
+ who</strong></del></span> <span class="inserted"><ins><em>that alone is
often quite informative.</p>
+
+ <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>was.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company</strong></del></span> has <span
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>phones of users
that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
+ tracking, but most users will be tricked</em></ins></span> by the <span
class="removed"><del><strong>manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
<p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>spy on children and
adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>one
more.</p>
</li>
<li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
+ and collect information about</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>users</a>. 40% of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection --></strong></del></span> <span class="inserted"><ins><em>its
users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -1573,11 +1736,7 @@
<li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in</em></ins></span> the phone, and in <span
class="removed"><del><strong>server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>server accounts,
+ spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
@@ -1729,130 +1888,98 @@
<ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>sends it
to third parties</a>.</p>
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to</em></ins></span> the <span
class="inserted"><ins><em>massive
+ program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its</em></ins></span> user's
<span class="removed"><del><strong>consent”</strong></del></span> <span
class="inserted"><ins><em>computer</a>.</p>
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
- <p>The driver</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> a <span class="removed"><del><strong>protection
against massive
- surveillance.</p>
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
</li>
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201512290">
- <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles</em></ins></span> snoop on <span
class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on</strong></del></span> <span
class="inserted"><ins><em>report to the
- internet</a>—even</em></ins></span> what <span
class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>post on various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>weigh.</p>
+ <li id="M201512290">
+ <p>Many <a
+
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
- <p>A game console is a computer,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>you can't trust a computer with
- a nonfree operating system.</p></em></ins></span>
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users</em></ins></span> and <span
class="removed"><del><strong>suggests you to share</strong></del></span> <span
class="inserted"><ins><em>their users'
+ <li id="M201509160">
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>picture you take
according</strong></del></span> <span class="inserted"><ins><em>data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
“whales” who can be led to spend a lot of money. They also
- use a back door</em></ins></span> to <span class="removed"><del><strong>who
- is in</strong></del></span> <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ use a back door to manipulate the game play for specific players.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
- can use</em></ins></span> the <span class="removed"><del><strong>wire to
Facebook's servers</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
</li>
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
- to <span class="removed"><del><strong>the
service.</p></strong></del></span> <span class="inserted"><ins><em>spy
through it too</a>. Here's information on <a
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
- <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>based</strong></del></span> <span
class="inserted"><ins><em>a hidden
+ <li id="M200510200">
+ <p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>every
process running on a gamer's computer</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span> <span
class="inserted"><ins><em>sniffs a
+ spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>do
with cheating.</p>
+ have nothing to do with cheating.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>snoop on the people</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This</strong></del></span> <span
class="inserted"><ins><em>unfortunate that the</em></ins></span> article <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="inserted"><ins><em>term</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -1862,9 +1989,7 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</em></ins></span> a <span
class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>joke: The other day</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>woman came up to me and
+<p>Emo Phillips made a joke: The other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
@@ -1873,63 +1998,35 @@
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own
words</em></ins></span> of the <span class="removed"><del><strong>proprietary
software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data is sold to third parties. This is in
return</em></ins></span> for <span class="removed"><del><strong>mobile devices
report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What</em></ins></span> is <span
class="removed"><del><strong>doing</strong></del></span> <span
class="inserted"><ins><em>supposed to make</em></ins></span> this <span
class="removed"><del><strong>in a way</strong></del></span> <span
class="inserted"><ins><em>spying acceptable, according to him,
- is</em></ins></span> that <span class="removed"><del><strong>at
least</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> is <span
class="removed"><del><strong>visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for
children</strong></del></span> <span class="inserted"><ins><em>Vizio software is
- nonfree, we</em></ins></span> don't <span
class="removed"><del><strong>respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>.
This</strong></del></span> <span class="inserted"><ins><em>know
what</em></ins></span> is <span class="removed"><del><strong>in addition to
- the snooping done by</strong></del></span> <span
class="inserted"><ins><em>actually happening behind</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
- and <span class="removed"><del><strong>perhaps by the OS
in</strong></del></span> <span class="inserted"><ins><em>there is no guarantee
that all future updates will leave</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is opt-in in newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
<p>If you already own a Vizio smart TV (or any smart TV, for that
- matter),</em></ins></span> the <span class="removed"><del><strong>question
of whether</strong></del></span> <span class="inserted"><ins><em>easiest way to
make sure it isn't spying on you is
- to disconnect it from</em></ins></span> the <span
class="removed"><del><strong>app developers</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to</em></ins></span> get
- <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>your own router (which can
+ if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p></em></ins></span>
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>the facts</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>presents. It
- is too bad that</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix</em></ins></span> app <span
class="removed"><del><strong>developer but did</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -1937,132 +2034,77 @@
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and</em></ins></span> not
- <span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>just broadcasts
and
+ report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
<span class="inserted"><ins><em>disable</em></ins></span> the
- <span class="removed"><del><strong>weakness of</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
- sounds</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware running
- on other devices in range so as</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>determine that they
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>spying on
their users: their</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span class="removed"><del><strong>then sends
personal data about</strong></del></span>
- <span class="inserted"><ins><em>link</em></ins></span> them <span
class="inserted"><ins><em>your IP address</a> so that advertisers can
track you
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
- is an injustice already.</p></em></ins></span>
+ <p>It is possible to turn this off, but having it enabled by default
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>spy through it too</a>.
- Here's</strong></del></span> <span class="inserted"><ins><em>the 600
millions social media profiles the company
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
- being watched by advertisers. By combining TV viewing</em></ins></span>
- information <span class="removed"><del><strong>on</strong></del></span>
<span class="inserted"><ins><em>with online social media participation, Tivo
can now</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p></em></ins></span>
+ users to new combined surveillance by default.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on <span class="removed"><del><strong>a child's
speech,</strong></del></span> <span class="inserted"><ins><em>what programs
people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
- record</a>.</p></em></ins></span>
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
- users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>US or some
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>was surrounded</strong></del></span>
<span class="inserted"><ins><em>is done</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free
- software <span class="removed"><del><strong>which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
@@ -2071,180 +2113,115 @@
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report</em></ins></span> was <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
- consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to
<span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
- user <span class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>watches—no
exceptions!</p></em></ins></span>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span>
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</strong></del></span>
+ <p>Specifically, it can collect</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span class="inserted"><ins><em>user
watches, and</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>switch
to turn this off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> could <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>save that data anyway.)</p>
-
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches,
and the switch to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
- long-term.</p>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
- <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
- <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
- at <span class="removed"><del><strong>Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
- <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
@@ -3235,7 +3212,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/02 17:01:06 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary-surveillance.it.po 2 Jun 2019 17:01:06 -0000 1.304
+++ proprietary-surveillance.it.po 7 Jun 2019 08:33:54 -0000 1.305
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1215,6 +1215,19 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <ul><li><p>
+msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | The DMCA and the EU Copyright Directive make it <a
# | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\">
# | illegal to study how iOS [-cr...apps-] {+cr…apps+} spy on
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary-surveillance.ja-diff.html 2 Jun 2019 17:01:06 -0000
1.153
+++ proprietary-surveillance.ja-diff.html 7 Jun 2019 08:33:54 -0000
1.154
@@ -632,10 +632,32 @@
<li><p>iPhones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
+ <li id="M201906030">
+ <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said</em></ins></span> to
<span class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them</strong></del></span> <span class="inserted"><ins><em>be
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span
class="removed"><del><strong>there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+ <span class="inserted"><ins><em>Apple or from
governments</em></ins></span> that <span class="inserted"><ins><em>can command
Apple's obedience (such
+ as</em></ins></span> the <span class="removed"><del><strong>user types
into it</a>; the server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>US and China).</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Users
cannot</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="removed"><del><strong>install
even gratis apps)</a>
+ without giving a valid email address and receiving the code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>study how
iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
@@ -645,47 +667,38 @@
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
- lots of personal data to Apple's servers</a>. Big Brother can get
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>their users
with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
them from there.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The</em></ins></span> iMessage app on iThings <a
+ <li id="M201609280">
+ <p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+ server records these numbers for at least 30
days.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47% of the most popular iOS apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
- </li>
-
- <li><p>iThings automatically upload</strong></del></span>
+ <span
class="removed"><del><strong><li><p>iThings</strong></del></span>
<span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to Apple's servers
all the photos
+ <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -810,25 +823,25 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904130">
<p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes <a
+ on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span> <span class="inserted"><ins><em>sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location</strong></del></span> data <span
class="removed"><del><strong>from the
- GPS, take photographs, read text messages, read
call,</strong></del></span> <span class="inserted"><ins><em>for
years</a>.</p>
+ saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software in the phone has</em></ins></span> to <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="inserted"><ins><em>to Google.</p>
</li>
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
+ upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
what the “consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -921,19 +934,19 @@
<li id="M201302150">
<p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
-
- <p>Merely asking the “consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ honestly identify the information it collects on users,
instead</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
+ <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -962,52 +975,34 @@
<p>This example illustrates how “getting the user's
consent”
for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li><p>Apps that include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></em></ins></span>
</li>
- <li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201212030">
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>users post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1025,30 +1020,19 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> is <span
class="removed"><del><strong>nasty.</p></strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
- makes it even more vicious.</p></em></ins></span>
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
- <p>This <span class="removed"><del><strong>article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary
apps</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1057,407 +1041,304 @@
<ul class="blurbs">
<li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
- apps the user has
- installed.</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
+ and suggests</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
+ <p>It snoops on users, too, as</em></ins></span> you <span
class="inserted"><ins><em>must expect from nonfree
programs.</p>
</li>
<li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
- sensitive data, including user's location</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>contact list, and
has <a
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
+ the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
+
+ <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can
easily</em></ins></span> be
+ <span class="removed"><del><strong>sent across</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
+ these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+ free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
</li>
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>is often</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>user</a>.
This</strong></del></span>
- <span class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>“anonymized and aggregated,” it can
easily be
- traced back</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is
available from <a
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>snooping). In August
+ 2015 it</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
+ a <span class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="inserted"><ins><em>being developed</a>.</p>
+ </li>
- <p>This has harmful implications for women's rights to equal
employment</em></ins></span>
- and <span class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
+ <li id="M201903251">
+ <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude</strong></del></span> <span class="inserted"><ins><em>huge
number</em></ins></span> of <span class="removed"><del><strong>the proprietary
software industry towards
+ those they</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
- <p>Don't be distracted by the question of whether the app
developers get
- users</strong></del></span> <span
class="inserted"><ins><em>freedom</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>make their own
pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
- the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
- surveillance on which</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary</strong></del></span> <span
class="inserted"><ins><em>access to sensitive data without
+ users' knowledge</a>. These hidden</em></ins></span> apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>may either call
home with
+ the data, or pass it on to user-installed</em></ins></span> apps <span
class="inserted"><ins><em>that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which</em></ins></span> the user has
+ <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
- send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
- “consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>doing this</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span>
+ <span class="inserted"><ins><em>lengthy terms of service</em></ins></span>
that <span class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>are difficult to understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>not
sufficient to legitimize snooping.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps</strong></del></span>
<span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <p>Facebook offered a convenient proprietary
+ library</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies
built</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="inserted"><ins><em>Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company,</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
-</ul>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>perhaps
by</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>OS in the
+ phone.</p>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <p>Don't be distracted by the question of whether the app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
+ </li>
-<ul>
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
- <p>It shows</em></ins></span> that <span
class="removed"><del><strong>makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>no one can trust a nonfree program, not even the
- developers</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p>
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p>
</li>
+</ul>
- <li id="M201902140">
- <p>The AppCensus database gives</em></ins></span> information <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>on <a
- href="https://www.appcensus.mobi"></em></ins></span> how
- <span class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>Android apps</em></ins></span> use <span
class="removed"><del><strong>it</a>.</p>
-
- <p>The company's statement that it anonymizes the data may be
- true, but it doesn't really matter. If it sells</strong></del></span>
<span class="inserted"><ins><em>and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>a
- data broker, the data broker can figure out who the user is.</p>
- </li>
- <li><p>A computerized
- vibrator</strong></del></span> <span class="inserted"><ins><em>other
companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control app</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
- <p>The app reports the temperature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly, whether
it</strong></del></span> <span class="inserted"><ins><em>resetting it.</p>
-
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>surrounded by a person's
- body), and the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in
apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users can check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
+<ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
<span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>redirecting
- them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
+
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people use it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the data may be
+ true, but it doesn't really matter. If it sells the data to a
+ data broker, the data broker can figure out who</strong></del></span>
<span class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>interface of most of them was designed to make
uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
+ addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>users.
Other technical flaws were
+ potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>members of Parliament
- this way, because</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>are <em>not</em></em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
+ <li id="M201901050"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="inserted"><ins><em>will do
+ with the data.</p>
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), and</strong></del></span> <span class="inserted"><ins><em>side
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>data is</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users can check
+ and change.</p>
</li>
-</ul>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>.</em></ins></span> The
<span class="removed"><del><strong>Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>company</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>about a side issue.
What</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>user reads
at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>data is
a secondary issue. The principal wrong here is that</em></ins></span>
- the <span class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span> <span
class="inserted"><ins><em>company gets that</em></ins></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
- </li>
-</ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>at all.</p>
-
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and
WeatherBug,</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>tracking people's
locations.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
- effectively
- anyone</strong></del></span>
+<li><p></strong></del></span>
<span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>system
has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span>
- <span class="inserted"><ins><em>Facebook can correlate</em></ins></span>
the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>demands blind faith</strong></del></span> <span
class="inserted"><ins><em>obtains</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
-
- <p>Even if no one connects to the car
remotely,</strong></del></span> the <span class="removed"><del><strong>cell
phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>same
machine via
- various apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>phone company to
track</strong></del></span> <span class="inserted"><ins><em>user's activities
in</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>app; others only say
that</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span>
is <span class="removed"><del><strong>possible to physically remove the cell
phone modem
- though.</p>
- </li>
-
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that
alone</em></ins></span> is <span class="removed"><del><strong>made available to
car manufacturers, insurance companies, and
- others.</p>
+ report</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's actions to
Facebook</a>.</p>
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>often quite informative.</p>
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
- really</strong></del></span> <span class="inserted"><ins><em>whether the
user has</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>Facebook
+ <p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>users that have
deleted them</a>.</p>
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
@@ -1466,229 +1347,118 @@
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There</em></ins></span> are <span class="removed"><del><strong>an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> other
- <span class="removed"><del><strong>cases mentioned are
done</strong></del></span> <span class="inserted"><ins><em>kinds of location
- tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
<p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no way to save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
+ <p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop</em></ins></span>
- and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>collect information about its users</a>.
40% of</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> were <span
class="removed"><del><strong>programmed</strong></del></span>
- <span class="inserted"><ins><em>found</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at.</em></ins></span> The other <span
class="removed"><del><strong>day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the</strong></del></span> <span
class="inserted"><ins><em>apps might be snooping
- in</em></ins></span> other <span class="removed"><del><strong>way.”
Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
-
- <p>This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>is evidence</em></ins></span> that <span
class="removed"><del><strong>laws requiring products</strong></del></span>
<span class="inserted"><ins><em>proprietary apps generally work against
+ <p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to get <span class="removed"><del><strong>users'
formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>rid
of</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps from the free
software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>TVs
are not allowed to report what</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the user <span class="removed"><del><strong>watches — no
exceptions!</p></strong></del></span> <span class="inserted"><ins><em>if
an app contains anti-features</a>.</p></em></ins></span>
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed</em></ins></span> so that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>users communicate such info</em></ins></span> to
<span class="removed"><del><strong>turn this off,</strong></del></span> <span
class="inserted"><ins><em>each
- other</em></ins></span> but <span class="removed"><del><strong>having it
enabled by default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media profiles the company
already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible sounds to be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>dis-service
- spy</em></ins></span> on <span class="removed"><del><strong>other devices
in
- range so as to determine that</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where</em></ins></span> they <span class="removed"><del><strong>are
nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>travel before</em></ins></span> and
- <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>after going to a movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711240">
+ <li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive</em></ins></span> and <span
class="inserted"><ins><em>sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads</em></ins></span> all <span class="inserted"><ins><em>phone
numbers and email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>words
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+ </li>
+
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></em></ins></span>
+ referring to zero price.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet to another
- company, Nuance</a>. Nuance can save it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="removed"><del><strong>would then
have to
- give it</strong></del></span> <span class="inserted"><ins><em>sent them
and text messages and emails</em></ins></span> to <span
class="removed"><del><strong>the US or some other government.</p>
- <p>Speech recognition is</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
-
- <p>Google did</em></ins></span> not <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>be trusted unless</strong></del></span> <span
class="inserted"><ins><em>make these apps spy; on the
contrary,</em></ins></span> it <span class="removed"><del><strong>is done
- by free software in your own computer.</p>
- </li>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>worked</em></ins></span> in
- <span class="removed"><del><strong><a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
- discovering</em></ins></span> what <span class="inserted"><ins><em>they
did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>user
watches,</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android
apps,</em></ins></span> and
- <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>switch to turn this off has no effect. (The
fact that</strong></del></span> <span class="inserted"><ins><em>responsibility
for</em></ins></span> the
- <span class="removed"><del><strong>transmission
reports</strong></del></span> <span class="inserted"><ins><em>injustice of
their being
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>404 error really means nothing; the
server</strong></del></span> <span class="inserted"><ins><em>better job of
preventing apps from
+ <p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google</em></ins></span> could <span
class="removed"><del><strong>save that data anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>demand</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
+ <p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If</em></ins></span> it <span
class="removed"><del><strong>had installed</strong></del></span> <span
class="inserted"><ins><em>did</em></ins></span> a <span
class="removed"><del><strong>patch to stop</strong></del></span> <span
class="inserted"><ins><em>good job of</em></ins></span> this, <span
class="removed"><del><strong>but any product</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> could <span
class="removed"><del><strong>spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> <span class="inserted"><ins><em>more or less
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>the
- public, so we can depend on each other.</p></em></ins></span>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<ul>
- <li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"></em></ins></span>
- snoop on <span class="removed"><del><strong>their</strong></del></span>
<span class="inserted"><ins><em>users</a>.</p>
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
- <p>With free software apps,</em></ins></span> users <span
class="removed"><del><strong>and report</strong></del></span> <span
class="inserted"><ins><em>could <em>make sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
@@ -1704,20 +1474,13 @@
<li id="M201704260">
<p>Faceapp appears to do lots of surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="inserted"><ins><em>personal data in</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span class="removed"><del><strong>wide
range of data about their users and</strong></del></span> <span
class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
@@ -2283,7 +2046,8 @@
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look
+ <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
@@ -2293,11 +2057,14 @@
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>“clean”
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>to look at
what's</em></ins></span> in <span class="removed"><del><strong>its own
malware</a>.
+</p></li></strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -2315,11 +2082,14 @@
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
- </li>
+ </li></em></ins></span>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtWork -->
+<!-- WEBMASTERS:</strong></del></span>
-<div class="big-subsection">
+
+<span class="inserted"><ins><em><div class="big-subsection">
<h4 id="SpywareInToys">Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
@@ -2349,140 +2119,245 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data
to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
+ customers.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>access the
data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ <li id="M201612060"></em></ins></span>
+ <p>The <span class="removed"><del><strong>Nest
Cam</strong></del></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ crackers to listen in on a child's speech, and</em></ins></span> even
<span class="removed"><del><strong>when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
</li>
<li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ going</em></ins></span> to <span class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ to snoop</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+ even if <span class="removed"><del><strong>it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
+ deleting</em></ins></span> the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
+ the devices are tethered to. Moreover, they are made
available</em></ins></span> to
+ <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
+ at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
+ paying for the subscription,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
- working order.</p>
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
+ <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>US
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
@@ -2494,29 +2369,51 @@
<li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over the Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
+ cases mentioned</strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products are designed <a
+ <p>Lots of “smart” products</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ listen to everyone</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>car's location
at</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
- <p>Today's technological practice does not include any way of making
+ <p>Today's technological practice does not include</em></ins></span>
any <span class="removed"><del><strong>time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but</strong></del></span> <span
class="inserted"><ins><em>way of making
a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
+ on you. Even</em></ins></span> if <span class="removed"><del><strong>the
state orders</strong></del></span> it <span class="removed"><del><strong>to get
the data
+ and hand</strong></del></span> <span class="inserted"><ins><em>is
air-gapped,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>could be saving up records
about you for later examination.</p>
</li>
<li id="M201407170">
<p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about the user</a>.</p>
+ data about</em></ins></span> the <span class="removed"><del><strong>state
can store it.</p></strong></del></span> <span
class="inserted"><ins><em>user</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201310260">
- <p><a
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201310260">
+ <p><a</em></ins></span>
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
@@ -2524,17 +2421,39 @@
<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing <a
-
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
+ <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often people wear it</a>.</p></em></ins></span>
+
+ <p>This <span class="removed"><del><strong>shows that laws requiring
products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the
TV</strong></del></span> will
+ <span class="removed"><del><strong>not work.”</p>
- <p>This will teach the sheeple to find it normal that companies
+ <p>Proper laws would say that TVs are not allowed to report what
+ the user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>teach the sheeple to find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2544,18 +2463,36 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
-
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>report its
location</em></ins></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span
class="inserted"><ins><em>someone else and</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
too</a>.</p>
</li>
</ul>
@@ -2568,18 +2505,20 @@
<ul class="blurbs">
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and <a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
+ <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
when they go to a junkyard the driver's personal data goes with
- them</a>.</p>
+ them</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is
constantly
connected to the cellular phone network and sends Ford a lot of data,
- including car location. This feature operates even when the ignition
+ including car location. This feature operates</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when the ignition
key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
@@ -2588,88 +2527,133 @@
</li>
<li id="M201811300">
- <p>In China, it is mandatory for electric
- cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect this data</a> as part of</em></ins></span>
their <span class="inserted"><ins><em>own spying, then
- forward it to the government-run platform.</p>
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201810230">
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a> in its
+ <span class="inserted"><ins><em><li id="M201810230">
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get</em></ins></span> users'
- <span class="removed"><del><strong>friends</strong></del></span> <span
class="inserted"><ins><em>consent, but it could have got that easily by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
+ phones. <em>All</em> such data collection
should</em></ins></span> be <span class="removed"><del><strong>trusted unless
it</strong></del></span> <span class="inserted"><ins><em>forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that data.</p>
+ hardware cannot collect any of that data, or that the
software</em></ins></span>
+ is <span class="removed"><del><strong>done
+ by</strong></del></span> free <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't
collect any of that data.</p>
</li>
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p>
</li>
<li id="M201607160">
<p id="car-spying">Computerized cars with nonfree software are <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ snooping devices</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li id="M201602240">
+ <span class="inserted"><ins><em><li id="M201602240">
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to</em></ins></span> do <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>because the system has no authentication
- when accessed</em></ins></span> through <span
class="removed"><del><strong>ad networks</strong></del></span> <span
class="inserted"><ins><em>the modem. However, even if it asked
- for authentication, you couldn't be confident</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software</em></ins></span> in <span
class="inserted"><ins><em>the car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone modem
- enables the phone company to track the car's movements all the time;
- it is possible to physically remove the cell phone modem, though.</p>
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>user watches, and</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ enables</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>phone company</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact that the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>car's movements all</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>time;</em></ins></span>
+ it <span class="removed"><del><strong>had installed a
patch</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span class="removed"><del><strong>stop this, but
any product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>physically remove the cell phone modem,
though.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow the company</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
</li>
+</ul>
- <li id="M201306140">
- <p>Tesla cars allow the company to extract
- data remotely and determine the car's location
- at any time. (See Section 2, paragraphs b and c of the <a
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware</strong></del></span> <span
class="inserted"><ins><em>extract
+ data remotely and determine the car's location</em></ins></span>
+ at <span class="removed"><del><strong>Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>any time. (See Section 2, paragraphs
b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
- information, but if the state orders it to get the data and hand it
- over, the state can store it.</p>
+ information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
+
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p></em></ins></span>
</li>
- <li id="M201303250">
- <p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
- available to car manufacturers, insurance companies, and others.</p>
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201303250">
+ <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
<p>The case of toll-collection systems, mentioned in this article,
is not really a matter of proprietary surveillance. These systems
- are an intolerable invasion of privacy, and should be replaced with
+ are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
@@ -3086,7 +3070,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/02 17:01:06 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- proprietary-surveillance.ja.po 2 Jun 2019 17:01:06 -0000 1.277
+++ proprietary-surveillance.ja.po 7 Jun 2019 08:33:54 -0000 1.278
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -993,6 +993,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
"cr…apps spy on users</a>, because this would require circumventing "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary-surveillance.pot 2 Jun 2019 17:01:06 -0000 1.225
+++ proprietary-surveillance.pot 7 Jun 2019 08:33:54 -0000 1.226
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -658,6 +658,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a "
+"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\"> track "
+"iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a "
"href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\"> "
"illegal to study how iOS cr…apps spy on users</a>, because this would "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.531
retrieving revision 1.532
diff -u -b -r1.531 -r1.532
--- proprietary-surveillance.ru.po 2 Jun 2019 18:59:53 -0000 1.531
+++ proprietary-surveillance.ru.po 7 Jun 2019 08:33:54 -0000 1.532
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-02 16:56+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -891,6 +892,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
"cr…apps spy on users</a>, because this would require circumventing "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.de-diff.html 1 Jun 2019 17:31:29 -0000 1.96
+++ proprietary.de-diff.html 7 Jun 2019 08:33:54 -0000 1.97
@@ -46,13 +46,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -128,9 +128,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -186,6 +186,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em> secure
from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -239,17 +250,6 @@
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
- server.</p>
-
- <p>The shutdown might ironically be good for their users, since the
- product was designed to manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying on them.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary.de.po 1 Jun 2019 17:31:29 -0000 1.138
+++ proprietary.de.po 7 Jun 2019 08:33:54 -0000 1.139
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -503,20 +516,6 @@
"\"> near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.es.po 3 Jun 2019 08:37:49 -0000 1.170
+++ proprietary.es.po 7 Jun 2019 08:33:54 -0000 1.171
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -406,27 +420,6 @@
"you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">control casi "
"total</a> del teléfono."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Los robots de juguete Jibo robot estaban conectados al servidor del "
-"fabricante. La empresa cerró el servidor e <a href=\"https://www.apnews."
-"com/99c9ec8ebad242ca88178e22c7642648\">hizo que todos dejaran de funcionar</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"Irónicamente, el cierre del servidor pudo ser beneficioso para los usuarios,
"
-"ya que el producto estaba diseñado para manipular a la gente simulando "
-"emociones, y casi con toda seguridad los estaba espiando."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +499,25 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Los robots de juguete Jibo robot estaban conectados al servidor del "
+#~ "fabricante. La empresa cerró el servidor e <a href=\"https://www.apnews."
+#~ "com/99c9ec8ebad242ca88178e22c7642648\">hizo que todos dejaran de "
+#~ "funcionar</a>."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "Irónicamente, el cierre del servidor pudo ser beneficioso para los "
+#~ "usuarios, ya que el producto estaba diseñado para manipular a la gente "
+#~ "simulando emociones, y casi con toda seguridad los estaba espiando."
+
+#~ msgid ""
#~ "The FordPass Connect feature of some Ford vehicles has <a href=\"https://"
#~ "www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> "
#~ "near-complete access to the internal car network</a>. It is constantly "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary.fr.po 1 Jun 2019 18:14:56 -0000 1.210
+++ proprietary.fr.po 7 Jun 2019 08:33:54 -0000 1.211
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-06-01 20:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -401,25 +415,6 @@
"comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
"\">contrôle presque complet</a> du téléphone."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Les robots-jouets Jibo dépendaient du serveur du fabricant. Ce dernier ayant
"
-"arrêté son serveur, les robots sont devenus inutilisables."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"Paradoxalement, cette fermeture pourrait être bonne pour les utilisateurs, "
-"car ce produit était conçu pour manipuler les gens en simulant des
émotions "
-"et très certainement les espionnait."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,3 +488,20 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Les robots-jouets Jibo dépendaient du serveur du fabricant. Ce dernier "
+#~ "ayant arrêté son serveur, les robots sont devenus inutilisables."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "Paradoxalement, cette fermeture pourrait être bonne pour les "
+#~ "utilisateurs, car ce produit était conçu pour manipuler les gens en "
+#~ "simulant des émotions et très certainement les espionnait."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.it-diff.html 1 Jun 2019 17:31:29 -0000 1.108
+++ proprietary.it-diff.html 7 Jun 2019 08:33:54 -0000 1.109
@@ -45,8 +45,8 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em> secure
from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -238,17 +249,6 @@
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
- server.</p>
-
- <p>The shutdown might ironically be good for their users, since the
- product was designed to manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying on them.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.it.po 1 Jun 2019 17:31:29 -0000 1.147
+++ proprietary.it.po 7 Jun 2019 08:33:54 -0000 1.148
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -507,20 +520,6 @@
"\"> near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.ja-diff.html 1 Jun 2019 17:31:29 -0000 1.109
+++ proprietary.ja-diff.html 7 Jun 2019 08:33:54 -0000 1.110
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -182,6 +182,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em> secure
from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -235,17 +246,6 @@
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
- server.</p>
-
- <p>The shutdown might ironically be good for their users, since the
- product was designed to manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying on them.</p>
- </li>
</ul></em></ins></span>
@@ -306,7 +306,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.ja.po 1 Jun 2019 17:31:29 -0000 1.130
+++ proprietary.ja.po 7 Jun 2019 08:33:54 -0000 1.131
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -425,20 +438,6 @@
"\"> near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.nl-diff.html 1 Jun 2019 17:31:29 -0000 1.108
+++ proprietary.nl-diff.html 7 Jun 2019 08:33:54 -0000 1.109
@@ -45,8 +45,8 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em> secure
from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -238,17 +249,6 @@
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
- server.</p>
-
- <p>The shutdown might ironically be good for their users, since the
- product was designed to manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying on them.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.nl.po 1 Jun 2019 17:31:29 -0000 1.119
+++ proprietary.nl.po 7 Jun 2019 08:33:54 -0000 1.120
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -500,20 +513,6 @@
"\"> near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary.pl-diff.html 1 Jun 2019 17:31:29 -0000 1.126
+++ proprietary.pl-diff.html 7 Jun 2019 08:33:54 -0000 1.127
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
+instances of malicious functionalities (with more than 450 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -128,17 +128,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -183,6 +183,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em> secure
from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -236,17 +247,6 @@
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
- server.</p>
-
- <p>The shutdown might ironically be good for their users, since the
- product was designed to manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying on them.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary.pl.po 1 Jun 2019 17:31:29 -0000 1.114
+++ proprietary.pl.po 7 Jun 2019 08:33:54 -0000 1.115
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -583,20 +596,6 @@
"\"> near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.pot 1 Jun 2019 17:31:29 -0000 1.111
+++ proprietary.pot 7 Jun 2019 08:33:54 -0000 1.112
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a "
+"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\"> track "
+"iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a "
"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\">
"
"tool for propaganda</a> by natalist Christians. It spreads distrust for "
@@ -311,20 +325,6 @@
"near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a "
-"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
-"company made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.pt-br.po 1 Jun 2019 17:31:29 -0000 1.170
+++ proprietary.pt-br.po 7 Jun 2019 08:33:54 -0000 1.171
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-05-20 00:20-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -376,26 +389,6 @@
"you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> controle quase "
"completo</a> sobre seu telefone."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"Os brinquedos do robô Jibo foram amarrados ao servidor do fabricante, e <a "
-"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> a empresa "
-"fez com que todos parassem de funcionar</a> desligando o servidor."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"O desligamento pode, ironicamente, ser bom para seus usuários, já que o "
-"produto foi projetado para manipular as pessoas, apresentando uma aparência "
-"falsa de emoções, e certamente estava espionando elas."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -471,6 +464,24 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "Os brinquedos do robô Jibo foram amarrados ao servidor do fabricante, e "
+#~ "<a href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> a "
+#~ "empresa fez com que todos parassem de funcionar</a> desligando o servidor."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "O desligamento pode, ironicamente, ser bom para seus usuários, já que o "
+#~ "produto foi projetado para manipular as pessoas, apresentando uma "
+#~ "aparência falsa de emoções, e certamente estava espionando elas."
+
+#~ msgid ""
#~ "The FordPass Connect feature of some Ford vehicles has <a href=\"https://"
#~ "www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> "
#~ "near-complete access to the internal car network</a>. It is constantly "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary.ru.po 1 Jun 2019 18:29:32 -0000 1.246
+++ proprietary.ru.po 7 Jun 2019 08:33:54 -0000 1.247
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-07 08:27+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -405,27 +419,6 @@
"bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
поÑÑи "
"полноÑÑÑÑ ÐºÐ¾Ð½ÑÑолиÑÑеÑ</a> ÑелеÑон."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-"РобоÑÑ-игÑÑÑки Jibo бÑли пÑивÑÐ·Ð°Ð½Ñ Ðº
ÑеÑвеÑÑ Ð¿ÑоизводиÑелÑ, и <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> компаниÑ
"
-"заÑÑавила вÑеÑ
иÑ
пÑекÑаÑиÑÑ ÑабоÑÑ</a>,
вÑклÑÑив ÑÑÐ¾Ñ ÑеÑвеÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-"Ðак ни паÑадокÑалÑно, ÑÑо вÑклÑÑение,
возможно, пÑинеÑло полÑзоваÑелÑм "
-"добÑо, поÑÐ¾Ð¼Ñ ÑÑо пÑодÑÐºÑ Ð±Ñл
ÑпÑоекÑиÑован Ñак, ÑÑÐ¾Ð±Ñ Ð¼Ð°Ð½Ð¸Ð¿ÑлиÑоваÑÑ "
-"полÑзоваÑелÑми, пÑедÑÑавлÑÑ ÑалÑÑивÑÑ
видимоÑÑÑ ÑмоÑий, и Ñж навеÑнÑка "
-"Ñпионил за ними."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -505,6 +498,25 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
+#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
+#~ "company made them all cease to work</a> by shutting down that server."
+#~ msgstr ""
+#~ "РобоÑÑ-игÑÑÑки Jibo бÑли пÑивÑÐ·Ð°Ð½Ñ Ðº
ÑеÑвеÑÑ Ð¿ÑоизводиÑелÑ, и <a href="
+#~ "\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\">
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ "
+#~ "заÑÑавила вÑеÑ
иÑ
пÑекÑаÑиÑÑ ÑабоÑÑ</a>,
вÑклÑÑив ÑÑÐ¾Ñ ÑеÑвеÑ."
+
+#~ msgid ""
+#~ "The shutdown might ironically be good for their users, since the product "
+#~ "was designed to manipulate people by presenting a phony semblance of "
+#~ "emotions, and was most certainly spying on them."
+#~ msgstr ""
+#~ "Ðак ни паÑадокÑалÑно, ÑÑо вÑклÑÑение,
возможно, пÑинеÑло полÑзоваÑелÑм "
+#~ "добÑо, поÑÐ¾Ð¼Ñ ÑÑо пÑодÑÐºÑ Ð±Ñл
ÑпÑоекÑиÑован Ñак, ÑÑÐ¾Ð±Ñ Ð¼Ð°Ð½Ð¸Ð¿ÑлиÑоваÑÑ "
+#~ "полÑзоваÑелÑми, пÑедÑÑавлÑÑ ÑалÑÑивÑÑ
видимоÑÑÑ ÑмоÑий, и Ñж навеÑнÑка "
+#~ "Ñпионил за ними."
+
+#~ msgid ""
#~ "The FordPass Connect feature of some Ford vehicles has <a href=\"https://"
#~ "www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> "
#~ "near-complete access to the internal car network</a>. It is constantly "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.zh-tw-diff.html 1 Jun 2019 17:31:29 -0000 1.86
+++ proprietary.zh-tw-diff.html 7 Jun 2019 08:33:54 -0000 1.87
@@ -46,13 +46,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -128,9 +128,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -186,6 +186,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201906030">
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when they are suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said to be
+ “secure,” but it is obviously <em>not</em> secure
from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -239,17 +250,6 @@
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
- server.</p>
-
- <p>The shutdown might ironically be good for their users, since the
- product was designed to manipulate people by presenting a phony
- semblance of emotions, and was most certainly spying on them.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/01 17:31:29 $
+$Date: 2019/06/07 08:33:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.zh-tw.po 1 Jun 2019 17:31:29 -0000 1.97
+++ proprietary.zh-tw.po 7 Jun 2019 08:33:54 -0000 1.98
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-01 17:26+0000\n"
+"POT-Creation-Date: 2019-06-07 08:27+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
@@ -414,20 +427,6 @@
"\"> near-complete control</a> over the phone."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
-"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
-"made them all cease to work</a> by shutting down that server."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The shutdown might ironically be good for their users, since the product was "
-"designed to manipulate people by presenting a phony semblance of emotions, "
-"and was most certainly spying on them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- pt-br.po 2 Jun 2019 17:01:06 -0000 1.120
+++ pt-br.po 7 Jun 2019 08:33:54 -0000 1.121
@@ -1140,6 +1140,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- ru.po 2 Jun 2019 19:29:44 -0000 1.202
+++ ru.po 7 Jun 2019 08:33:54 -0000 1.203
@@ -1470,6 +1470,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- zh-tw.po 2 Jun 2019 17:01:06 -0000 1.92
+++ zh-tw.po 7 Jun 2019 08:33:54 -0000 1.93
@@ -1098,6 +1098,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
+"app/\"> track iMonsters even when they are suspended</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This distributed bluetooth network is said to be “secure,” but "
+"it is obviously <em>not</em> secure from Apple or from governments that can "
+"command Apple's obedience (such as the US and China)."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/02
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/02
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/18