[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 10 Jun 2019 05:02:24 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/06/10 05:02:22
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.439&r2=1.440
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.533&r2=1.534
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.94&r2=1.95
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- de.po 8 Jun 2019 08:31:12 -0000 1.95
+++ de.po 10 Jun 2019 09:02:19 -0000 1.96
@@ -1733,6 +1733,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- es.po 9 Jun 2019 11:02:28 -0000 1.129
+++ es.po 10 Jun 2019 09:02:19 -0000 1.130
@@ -1528,6 +1528,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- fr.po 8 Jun 2019 16:55:38 -0000 1.165
+++ fr.po 10 Jun 2019 09:02:20 -0000 1.166
@@ -1485,6 +1485,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- it.po 8 Jun 2019 08:31:13 -0000 1.95
+++ it.po 10 Jun 2019 09:02:20 -0000 1.96
@@ -1718,6 +1718,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- ja.po 8 Jun 2019 08:31:13 -0000 1.94
+++ ja.po 10 Jun 2019 09:02:20 -0000 1.95
@@ -1467,6 +1467,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-apple.de-diff.html 7 Jun 2019 08:33:53 -0000 1.35
+++ malware-apple.de-diff.html 10 Jun 2019 09:02:20 -0000 1.36
@@ -659,114 +659,114 @@
<ul>
<li><p>iTunes videos have DRM,</strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Apple Sabotage</h3>
-<p>These are situations in</em></ins></span> which <span
class="removed"><del><strong>allows</strong></del></span> Apple <span
class="inserted"><ins><em>employs its power over users</em></ins></span>
-to <span class="inserted"><ins><em>directly intervene in ways that harm them
or block their work.</p>
+<p>These are situations in</em></ins></span> which <span
class="removed"><del><strong>allows</strong></del></span> Apple <span
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
<li id="M201810240">
- <p>Apple and Samsung deliberately</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its customers can
- watch</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>videos they
purchased</a>.</p></strong></del></span> <span
class="inserted"><ins><em>performance of older phones to force users to buy
their newer
- phones</a>.</p></em></ins></span>
+ <p>Apple and Samsung deliberately <a
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones</em></ins></span> to <span
class="inserted"><ins><em>force users to buy their newer
+ phones</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The DMCA and the EU
Copyright Directive make it</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201805310">
+ <li id="M201805310">
<p>Apple has</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
+ <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
+ Telegram from upgrading</em></ins></span> its <span
class="removed"><del><strong>customers can
+ watch the videos</strong></del></span> <span class="inserted"><ins><em>app
for a month</a>.</p>
- <p>This evidently has to do with Russia's command</em></ins></span>
to <span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
- would require circumventing the iOS DRM.</p>
- </li>
+ <p>This evidently has to do with Russia's command to Apple to block
+ Telegram in Russia.</p>
- <li><p><a
-
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"></strong></del></span>
Apple <span class="removed"><del><strong>uses DRM
software</strong></del></span> to <span class="removed"><del><strong>prevent
people from charging an iThing with a
- generic USB cable</a>.</p></li>
+ <p>The Telegram client is free software on other platforms, but not
on
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
+ are jails</a>,</em></ins></span> they <span
class="removed"><del><strong>purchased</a>.</p></strong></del></span>
<span class="inserted"><ins><em>don't permit any app to be free
software.</p></em></ins></span>
+ </li>
- <li><p><a
-
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms)</strong></del></span> <span
class="inserted"><ins><em>block
- Telegram</em></ins></span> in <span
class="removed"><del><strong>MacOS</a>. This article
- focuses</strong></del></span> <span
class="inserted"><ins><em>Russia.</p>
+ <span class="removed"><del><strong><li><p>The
DMCA</strong></del></span>
- <p>The Telegram client is free software on other platforms, but
not</em></ins></span> on
- <span class="inserted"><ins><em>iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be free
software.</p>
+ <span class="inserted"><ins><em><li id="M201710044">
+ <p>MacOS High Sierra forcibly reformats SSD boot
drives,</em></ins></span> and <span class="removed"><del><strong>the EU
Copyright Directive make it</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
+ would require circumventing</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ changes</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
</li>
- <li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span class="removed"><del><strong>fact that
a new model</strong></del></span> <span class="inserted"><ins><em>file system
from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>Macbook introduced a
requirement</strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
- </li>
+ <span class="removed"><del><strong><li><p><a
+
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"></strong></del></span>
- <li id="M201706060">
+ <span class="inserted"><ins><em><li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs</em></ins></span> for <span class="removed"><del><strong>monitors to
have malicious hardware, but DRM software in MacOS is
- involved in activating</strong></del></span> <span
class="inserted"><ins><em>older model iThings</a>.</p>
+ bugs for older model iThings</a>.</p>
- <p>Meanwhile, Apple stops people from fixing problems themselves;
- that's</em></ins></span> the <span class="removed"><del><strong>hardware.
The software for accessing iTunes
- is also responsible.</p></strong></del></span> <span
class="inserted"><ins><em>nature of proprietary
software.</p></em></ins></span>
- </li>
+ <p>Meanwhile,</em></ins></span> Apple <span
class="removed"><del><strong>uses DRM software to prevent</strong></del></span>
<span class="inserted"><ins><em>stops</em></ins></span> people from <span
class="removed"><del><strong>charging an iThing with a
+ generic USB cable</a>.</p></li>
- <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"></strong></del></span>
+ <li><p><a
+
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"></strong></del></span>
<span class="inserted"><ins><em>fixing problems themselves;
+ that's the nature of proprietary software.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201704070">
+ <li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains</em></ins></span> DRM <span
class="removed"><del><strong>that caters</strong></del></span> <span
class="inserted"><ins><em>specifically designed</em></ins></span> to <span
class="removed"><del><strong>Bluray disks</a>. (The article focused on
Windows
- and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em><a
+ iPhone 7 contains</em></ins></span> DRM <span
class="removed"><del><strong>(digital restrictions mechanisms) in
MacOS</a>. This</strong></del></span> <span
class="inserted"><ins><em>specifically designed to <a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>same thing subsequently.)</p></li>
-</ul>
-
-<h3 id="jails">Apple Jails</h3>
-
-<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS,</strong></del></span> <span class="inserted"><ins><em>term
“lock”
- to describe</em></ins></span> the <span
class="removed"><del><strong>operating system of</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span
class="removed"><del><strong>Apple iThings, is</strong></del></span> <span
class="inserted"><ins><em>term <a
+ <p>The</em></ins></span> article
+ <span class="removed"><del><strong>focuses on</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>fact that a new model of Macbook introduced a
requirement
+ for monitors</strong></del></span> <span class="inserted"><ins><em>term
“lock”</em></ins></span>
+ to <span class="removed"><del><strong>have malicious
hardware,</strong></del></span> <span class="inserted"><ins><em>describe the
DRM,</em></ins></span> but <span class="removed"><del><strong>DRM software in
MacOS is
+ involved in activating</strong></del></span> <span
class="inserted"><ins><em>we prefer to use</em></ins></span> the <span
class="removed"><del><strong>hardware. The software for accessing iTunes
+ is also responsible.</p></strong></del></span> <span
class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+ handcuffs</a>.</p></em></ins></span>
</li>
- <li id="M201606080">
+ <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080">
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops users from fixing</em></ins></span> the <span
class="removed"><del><strong>prototype
-of a jail</a>. It was</strong></del></span> <span
class="inserted"><ins><em>security bugs in Quicktime for Windows</a>,
+ stops users from fixing</em></ins></span> the <span
class="removed"><del><strong>same thing subsequently.)</p></li>
+</ul>
+
+<h3 id="jails">Apple Jails</h3>
+
+<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
+iOS,</strong></del></span> <span class="inserted"><ins><em>security bugs in
Quicktime for Windows</a>,
while refusing to fix them itself.</p>
</li>
<li id="M201605040">
- <p>The</em></ins></span> Apple <span
class="removed"><del><strong>that introduced</strong></del></span> <span
class="inserted"><ins><em>Music client program <a
+ <p>The Apple Music client program <a
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
- the <span class="removed"><del><strong>practice of
-designing general purpose computers with censorship of application
-programs.</p>
-
-<p>Here is</strong></del></span> <span class="inserted"><ins><em>user's
file system for music files, copies them to</em></ins></span> an <span
class="removed"><del><strong>article about the</strong></del></span> <span
class="inserted"><ins><em>Apple server,
+ the <span class="removed"><del><strong>operating</strong></del></span>
<span class="inserted"><ins><em>user's file</em></ins></span> system <span
class="removed"><del><strong>of the</strong></del></span> <span
class="inserted"><ins><em>for music files, copies them to an</em></ins></span>
Apple <span class="removed"><del><strong>iThings, is the prototype
+of a jail</a>. It was</strong></del></span> <span
class="inserted"><ins><em>server,
and deletes them</a>.</p>
</li>
<li id="M201602050">
- <p>iOS version 9 for iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <p>iOS version 9 for iThings <a
+
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism from</em></ins></span> the <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
+ Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>that introduced the practice of
+designing general purpose computers with censorship of application
+programs.</p>
+
+<p>Here is an article about</strong></del></span> <span
class="inserted"><ins><em>eventually backed off from this policy under
+ criticism from</em></ins></span> the <span
class="removed"><del><strong><a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a></strong></del></span> <span
class="inserted"><ins><em>users. However, it has not
acknowledged</em></ins></span> that <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>this
was wrong.</p>
</li>
@@ -796,8 +796,7 @@
An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All</em></ins></span> this <span
class="removed"><del><strong>freely because they are required to identify
-themselves.</strong></del></span> <span class="inserted"><ins><em>was
apparently intentional.</p>
+ censorship</a>. All</em></ins></span> this <span
class="removed"><del><strong>freely because</strong></del></span> <span
class="inserted"><ins><em>was apparently intentional.</p>
</li>
</ul>
@@ -806,32 +805,52 @@
<ul class="blurbs">
<li id="M201906030">
- <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.apple.com/xcode/">Here</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
- track iMonsters even when they</em></ins></span> are <span
class="removed"><del><strong>details</a>. While
this</strong></del></span> <span
class="inserted"><ins><em>suspended</a>.</p>
-
- <p>This distributed bluetooth network</em></ins></span> is <span
class="removed"><del><strong>a crack in the prison walls,</strong></del></span>
<span class="inserted"><ins><em>said to be
- “secure,” but</em></ins></span> it is <span
class="removed"><del><strong>not
-big enough to mean that the iThings are no longer jails.</p>
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even when</em></ins></span> they are <span
class="removed"><del><strong>required</strong></del></span> <span
class="inserted"><ins><em>suspended</a>.</p>
+
+ <p>This distributed bluetooth network is said</em></ins></span> to
<span class="removed"><del><strong>identify
+themselves. <a href="https://developer.apple.com/xcode/">Here
+are details</a>. While this</strong></del></span> <span
class="inserted"><ins><em>be
+ “secure,” but it</em></ins></span> is <span
class="removed"><del><strong>a crack in</strong></del></span> <span
class="inserted"><ins><em>obviously <em>not</em> secure from
+ Apple or from governments that can command Apple's obedience (such
+ as the US and China).</p>
+ </li>
+
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>prison walls,</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ and DoorDash. But</em></ins></span> it is <span
class="removed"><del><strong>not
+big enough to mean</strong></del></span> <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="inserted"><ins><em>most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>iThings are no longer jails.</p>
-<h4>Examples of censorship by</strong></del></span> <span
class="inserted"><ins><em>obviously <em>not</em> secure
from</em></ins></span>
- Apple <span class="removed"><del><strong>jails</h4>
+<h4>Examples</strong></del></span> <span
class="inserted"><ins><em>case</em></ins></span> of <span
class="removed"><del><strong>censorship</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected</em></ins></span> by <span class="removed"><del><strong>Apple
jails</h4>
<ul>
<li>
<p>Apple <a
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
- deleted several VPNs</strong></del></span> <span
class="inserted"><ins><em>or</em></ins></span> from <span
class="removed"><del><strong>its app store for China</a>, thus using
- its own censorship power to strengthen</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>of</strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
- as</em></ins></span> the <span class="removed"><del><strong>Chinese
- government.</p></strong></del></span> <span
class="inserted"><ins><em>US and China).</p></em></ins></span>
+ deleted several VPNs from its app store for China</a>, thus using
+ its own censorship power to strengthen that of</strong></del></span> the
<span class="removed"><del><strong>Chinese
+ government.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Apple is <a
+ <li>
+ <p>Apple</strong></del></span> <span
class="inserted"><ins><em>company, there</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps</strong></del></span>
+ censoring apps</strong></del></span> <span class="inserted"><ins><em>no
telling what it will be
+ used for.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201809070">
+ <li id="M201809070">
<p>Adware Doctor, an ad blocker</em></ins></span> for <span
class="inserted"><ins><em>MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
the <span class="removed"><del><strong>US government too</a>.
Specifically, it
@@ -1169,7 +1188,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- malware-apple.de.po 7 Jun 2019 08:33:53 -0000 1.130
+++ malware-apple.de.po 10 Jun 2019 09:02:20 -0000 1.131
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1102,6 +1102,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-apple.es.po 9 Jun 2019 10:40:44 -0000 1.137
+++ malware-apple.es.po 10 Jun 2019 09:02:20 -0000 1.138
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -927,6 +928,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- malware-apple.fr.po 7 Jun 2019 10:26:48 -0000 1.144
+++ malware-apple.fr.po 10 Jun 2019 09:02:20 -0000 1.145
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-06-07 12:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -929,6 +930,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-apple.it-diff.html 7 Jun 2019 08:33:53 -0000 1.43
+++ malware-apple.it-diff.html 10 Jun 2019 09:02:20 -0000 1.44
@@ -344,125 +344,133 @@
protect its users from Russian surveillance, and is therefore subject
to Russian censorship.</p>
- <p>However, the point here is the wrong of Apple's censorship of
+ <p>However, the point here is the wrong of Apple's <span
class="removed"><del><strong>censorship of
+apps.</p></strong></del></span> <span
class="inserted"><ins><em>censorship of
apps.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Apple</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701050">
- <p>Apple</em></ins></span> used its censorship system to enforce
China's censorship <a <span
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by</em></ins></span> blocking distribution of the New York Times <span
class="removed"><del><strong>app</a>.</p></li>
-
-<li><p>
-Apple</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+ <li id="M201701050">
+ <p>Apple used its censorship system to enforce China's censorship
<a
+
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
+ by blocking distribution of the New York Times app</a>.</p>
</li>
<li id="M201605190">
- <p>Apple</em></ins></span> censors games, <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning</em></ins></span> some games from the cr…app
store</a> because of which
+ <p>Apple censors games, <a
+
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning some games from the cr…app store</a> because of which
political points they suggest. Some political points are apparently
considered acceptable.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Apple</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509290">
- <p>Apple</em></ins></span> <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ <li id="M201509290">
+ <p>Apple <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
- committed the enormity of disassembling some <span
class="removed"><del><strong>iThings.
-</p></li>
-
-<li><p>
-Apple rejected an app that displayed the locations of US drone
-assassinations, giving various excuses. Each time the developers
-fixed one “problem”, Apple complained about another.
-After the fifth rejection,
-Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
-it was censoring the app based on the subject matter</a>.
-</p></li>
-
-<li><p>
-As</strong></del></span> <span class="inserted"><ins><em>iThings.</p>
+ committed the enormity of disassembling some iThings.</p>
</li>
<li id="M201509230">
- <p>As</em></ins></span> of 2015, Apple <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically</em></ins></span> bans apps that endorse abortion rights or
would help
+ <p>As of 2015, Apple <a
+
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
-<span class="removed"><del><strong><p>
-This</strong></del></span>
-
- <span class="inserted"><ins><em><p>This</em></ins></span> particular
political slant <a
+ <p>This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple <span class="removed"><del><strong>services</a>.
-</p></li>
-</ul>
-
-<h3 id="insecurity">Apple Insecurity</h3>
-
-<p>These bugs are/were not intentional, so unlike the rest
of</strong></del></span> <span
class="inserted"><ins><em>services</a>.</p>
+ affects other Apple services</a>.</p>
</li>
<li id="M201506250">
<p>Apple has banned iThing
- applications that show</em></ins></span> the <span
class="removed"><del><strong>file
- they do not count</strong></del></span> <span
class="inserted"><ins><em>confederate flag. <a
+ applications that show the confederate flag. <a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it</em></ins></span> as <span
class="removed"><del><strong>malware. We mention them</strong></del></span>
<span class="inserted"><ins><em>a symbol of racism</a>, but even
- strategic games that use it</em></ins></span> to <span
class="removed"><del><strong>refute</strong></del></span> <span
class="inserted"><ins><em>represent confederate army units
- fighting in</em></ins></span> the
- <span class="removed"><del><strong>supposition</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
-
- <p>This ludicrous rigidity illustrates the point</em></ins></span>
that <span class="removed"><del><strong>prestigious proprietary software
doesn't have grave
- bugs.</p>
+ Not only those that use it as a symbol of racism</a>, but even
+ strategic games that use it to represent confederate army units
+ fighting in the Civil War.</p>
-<ul>
- <li>
- <p>A vulnerability in Apple's Image I/O API</strong></del></span>
<span class="inserted"><ins><em>Apple should
- not be</em></ins></span> allowed <span class="removed"><del><strong>an
attacker</strong></del></span> to <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses</strong></del></span> <span
class="inserted"><ins><em>censor apps. Even if Apple carried
out</em></ins></span> this <span
class="removed"><del><strong>API</strong></del></span> <span
class="inserted"><ins><em>act of
+ <p>This ludicrous rigidity illustrates the point that Apple should
+ not be allowed to censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power</em></ins></span> to
<span class="removed"><del><strong>render
- a certain kind</strong></del></span> <span
class="inserted"><ins><em>impose its views
- about either</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these questions, or any
other.</p></em></ins></span>
+ the real issue. Apple should not have the power to impose its views
+ about either of these questions, or any other.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201412110">
+ <li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p></em></ins></span>
</li>
- <li id="M201405250">
- <p>Apple used this censorship power</em></ins></span> in <span
class="inserted"><ins><em>2014 to <a
-
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the iThings <span
class="removed"><del><strong>Messages
- app</strong></del></span> <span class="inserted"><ins><em>for a time.
It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned</em></ins></span> a <span class="removed"><del><strong>malicious
web site to extract all</strong></del></span> <span
class="inserted"><ins><em>game about growing marijuana</a>, while
permitting games
- about other crimes such as killing people. Perhaps Apple considers
+<span class="removed"><del><strong><li><p>
+Apple</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405250">
+ <p>Apple</em></ins></span> used <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> censorship <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>power in 2014</em></ins></span> to <span
class="removed"><del><strong>enforce
+China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of the New York Times app</a>.</p></li>
+
+<li><p>
+Apple censors
+games,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>cr…app store</a> because of which
political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
+Apple</strong></del></span> <span class="inserted"><ins><em>iThings for a
time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"></em></ins></span>
+ banned a <span class="removed"><del><strong>program from the App
Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p></strong></del></span> <span class="inserted"><ins><em>game
about growing marijuana</a>, while permitting games
+ about other crimes such as killing people. Perhaps</em></ins></span>
Apple <span class="inserted"><ins><em>considers
killing more acceptable than marijuana.</p>
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed the locations
+ <p>Apple</em></ins></span> rejected an app that displayed the
locations
of US drone assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection, Apple <a
- href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>subject
matter</a>.</p></em></ins></span>
+ complained about another. After the fifth rejection, Apple <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted</em></ins></span> it was censoring the app based on the subject
<span class="removed"><del><strong>matter</a>.
+</p></li>
+
+<li><p>
+As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights or would help women find abortions</a>.</p>
+
+<p>
+This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects other Apple services</a>.
+</p></li>
+</ul>
+
+<h3 id="insecurity">Apple Insecurity</h3>
+
+<p>These bugs are/were not intentional, so unlike the rest of the file
+ they do not count as malware. We mention them to refute the
+ supposition that prestigious proprietary software doesn't have grave
+ bugs.</p>
+
+<ul>
+ <li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render
+ a certain kind of image file</a>.</p>
+ </li>
+
+ <li>
+ <p>A bug in the iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+ a malicious web site to extract all the user's messaging
history</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>matter</a>.</p></em></ins></span>
</li>
</ul>
@@ -576,44 +584,42 @@
</li>
- <span class="removed"><del><strong><li>
- <p>The Apple Music client
- program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
- the user's file system for music files, copies them to an Apple
- server, and deletes them</a>.</p>
- </li>
-
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201606080"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201606080">
<p>Apple <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></em></ins></span>
+
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
stops users from fixing the security bugs in Quicktime for
Windows</a>,
- while refusing to fix them <span
class="removed"><del><strong>itself.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p>
+ while refusing to fix them itself.</p>
</li>
- <li id="M201605040">
- <p>The Apple Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
+ <li id="M201605040"></em></ins></span>
+ <p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
the user's file system for music files, copies them to an Apple server,
- and deletes them</a>.</p></em></ins></span>
+ and deletes them</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+stops users from fixing the security bugs in Quicktime for
+ Windows</a>, while refusing to fix them itself.</p>
+ </li>
+
+ <li></strong></del></span>
<span class="inserted"><ins><em><li id="M201602050"></em></ins></span>
<p>iOS version 9 for iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
Apple</a>. Apple eventually backed off from this policy under
- criticism from the users. However, it has not acknowledged that this
+ criticism from the users. However, it has not acknowledged that
+ <span class="removed"><del><strong>this was
wrong.</p></strong></del></span> <span class="inserted"><ins><em>this
was wrong.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510020">
+ <li id="M201510020">
<p>Apple forced millions of iThings to <a
href="https://discussions.apple.com/thread/7256669?tstart=0">download
a system upgrade without asking the users</a>. Apple did not
@@ -625,10 +631,12 @@
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
+ stores that competed with iTunes</a>.</p></em></ins></span>
</li>
- <li id="M200709270">
+ <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200709270">
<p><a
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></em></ins></span>
An Apple firmware “upgrade” bricked iPhones that had been
@@ -652,10 +660,27 @@
track iMonsters even when they are suspended</a>.</p>
<p>This distributed bluetooth network is said to be
- “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span class="removed"><del><strong>iPods the
music that users had got</strong></del></span>
- <span class="inserted"><ins><em>Apple or</em></ins></span> from <span
class="removed"><del><strong>internet music
- stores</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
- as the US and China).</p></em></ins></span>
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span
class="removed"><del><strong>iPods</strong></del></span>
+ <span class="inserted"><ins><em>Apple or from governments that can command
Apple's obedience (such
+ as</em></ins></span> the <span
class="removed"><del><strong>music</strong></del></span> <span
class="inserted"><ins><em>US and China).</p>
+ </li>
+
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>users had got from internet music
+ stores</strong></del></span> <span class="inserted"><ins><em>are busy at
night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1034,7 +1059,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-apple.it.po 7 Jun 2019 08:33:53 -0000 1.124
+++ malware-apple.it.po 10 Jun 2019 09:02:20 -0000 1.125
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1130,6 +1130,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-apple.ja-diff.html 7 Jun 2019 08:33:53 -0000 1.54
+++ malware-apple.ja-diff.html 10 Jun 2019 09:02:20 -0000 1.55
@@ -325,9 +325,9 @@
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
+cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is</em></ins></span> a <span
class="inserted"><ins><em>crack in the prison walls, it is not
+are details</a>. While this is a crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
@@ -362,8 +362,8 @@
</li>
<li id="M201701064">
- <p>Apple used its censorship</em></ins></span> system <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ <p>Apple used its censorship system to enforce Russian surveillance
<a
+
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
@@ -439,12 +439,12 @@
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>locations
+ <p>Apple rejected an app that displayed the locations
of US drone assassinations, giving various excuses. Each
- time the developers fixed one “problem”,</em></ins></span>
Apple <span class="removed"><del><strong>did not forcibly
install</strong></del></span>
- <span class="inserted"><ins><em>complained about another.
After</em></ins></span> the <span class="removed"><del><strong>upgrade
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection,
Apple <a
+ time the developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span class="inserted"><ins><em>app
based on the subject matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
@@ -459,8 +459,10 @@
to find</a>.</p>
<p>This allows a company such as Apple to say, “We allow users
- to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to turn this off” while ensuring that few will understand
how</em></ins></span>
+ to <span class="removed"><del><strong>download a system upgrade
+ <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.
+ Apple did not forcibly install the upgrade but the downloading alone
caused lots of trouble.</p></strong></del></span> <span
class="inserted"><ins><em>actually turn it off.</p></em></ins></span>
</li>
</ul>
@@ -487,99 +489,95 @@
<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
+not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way that hurts the user.
+But they are a lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> Apple
+<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways</em></ins></span> that harm <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>them or block their work.</p>
<ul class="blurbs">
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance
of older phones to force users to buy their newer
+ the <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>performance</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
+ Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> to
<span class="inserted"><ins><em>block
- Telegram in Russia.</p>
+ <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span
class="removed"><del><strong>software.</p>
- <p>The Telegram client is free software on other platforms, but not
on
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>to block
+ Telegram in Russia.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
+ <span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+ to APFS</a>, which
cannot be
- accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
<li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs for older model iThings</a>.</p>
+ bugs</em></ins></span> for <span class="removed"><del><strong>music files,
copies them</strong></del></span> <span class="inserted"><ins><em>older model
iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple <span
class="inserted"><ins><em>stops people from fixing problems themselves;
- that's the nature of proprietary</em></ins></span> software.</p>
-
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em></li>
+ <p>Meanwhile, Apple stops people from fixing problems themselves;
+ that's the nature of proprietary software.</p>
+ </li>
<li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains DRM specifically designed to <a
+ iPhone 7 contains DRM specifically designed</em></ins></span> to <span
class="inserted"><ins><em><a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick it if an “unauthorized” repair shop fixes it</a>.
+ brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
+ server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>“unauthorized” repair shop fixes
it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+ handcuffs</a>.</p></em></ins></span>
</li>
- <li id="M201606080">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080"></em></ins></span>
<p>Apple <a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></em></ins></span>
stops users from fixing the security bugs in Quicktime for
Windows</a>,
while refusing to fix them itself.</p>
</li>
- <li id="M201605040"></em></ins></span>
- <p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605040">
+ <p>The Apple Music client program <a
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
the user's file system for music files, copies them to an Apple server,
and deletes them</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Apple <a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops users from fixing the security bugs in Quicktime for
- Windows</a>, while refusing to fix them itself.</p>
- </li>
-
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201602050"></em></ins></span>
+ <li id="M201602050"></em></ins></span>
<p>iOS version 9 for iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
Apple</a>. Apple eventually backed off from this policy under
- criticism from the users. However, it has not acknowledged that this
+ criticism from the <span class="removed"><del><strong>users. However, it
has not acknowledged</strong></del></span> <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
was wrong.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510020">
+ <li id="M201510020">
<p>Apple forced millions of iThings to <a
href="https://discussions.apple.com/thread/7256669?tstart=0">download
a system upgrade without asking the users</a>. Apple did not
@@ -590,11 +588,14 @@
<li id="M201412040">
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
+ deleted from iPods the music</em></ins></span> that
+ <span class="removed"><del><strong>this was
wrong.</p></strong></del></span> <span class="inserted"><ins><em>users
had got from internet music
+ stores that competed with iTunes</a>.</p></em></ins></span>
</li>
- <li id="M200709270">
+ <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200709270">
<p><a
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></em></ins></span>
An Apple firmware “upgrade” bricked iPhones that had been
@@ -618,10 +619,27 @@
track iMonsters even when they are suspended</a>.</p>
<p>This distributed bluetooth network is said to be
- “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span class="removed"><del><strong>iPods the
music that users had got</strong></del></span>
- <span class="inserted"><ins><em>Apple or</em></ins></span> from <span
class="removed"><del><strong>internet music
- stores</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
- as the US and China).</p></em></ins></span>
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span
class="removed"><del><strong>iPods</strong></del></span>
+ <span class="inserted"><ins><em>Apple or from governments that can command
Apple's obedience (such
+ as</em></ins></span> the <span
class="removed"><del><strong>music</strong></del></span> <span
class="inserted"><ins><em>US and China).</p>
+ </li>
+
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>users had got from internet music
+ stores</strong></del></span> <span class="inserted"><ins><em>are busy at
night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -992,7 +1010,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- malware-apple.ja.po 7 Jun 2019 08:33:53 -0000 1.105
+++ malware-apple.ja.po 10 Jun 2019 09:02:20 -0000 1.106
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -925,6 +925,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-apple.nl-diff.html 7 Jun 2019 08:33:53 -0000 1.60
+++ malware-apple.nl-diff.html 10 Jun 2019 09:02:20 -0000 1.61
@@ -325,9 +325,9 @@
<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
+cannot do this freely because they are required to identify
themselves. <a href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is</em></ins></span> a <span
class="inserted"><ins><em>crack in the prison walls, it is not
+are details</a>. While this is a crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
@@ -362,8 +362,8 @@
</li>
<li id="M201701064">
- <p>Apple used its censorship</em></ins></span> system <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ <p>Apple used its censorship system to enforce Russian surveillance
<a
+
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
@@ -439,12 +439,12 @@
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>locations
+ <p>Apple rejected an app that displayed the locations
of US drone assassinations, giving various excuses. Each
- time the developers fixed one “problem”,</em></ins></span>
Apple <span class="removed"><del><strong>did not forcibly
install</strong></del></span>
- <span class="inserted"><ins><em>complained about another.
After</em></ins></span> the <span class="removed"><del><strong>upgrade
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection,
Apple <a
+ time the developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span class="inserted"><ins><em>app
based on the subject matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
@@ -459,8 +459,10 @@
to find</a>.</p>
<p>This allows a company such as Apple to say, “We allow users
- to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to turn this off” while ensuring that few will understand
how</em></ins></span>
+ to <span class="removed"><del><strong>download a system upgrade
+ <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.
+ Apple did not forcibly install the upgrade but the downloading alone
caused lots of trouble.</p></strong></del></span> <span
class="inserted"><ins><em>actually turn it off.</p></em></ins></span>
</li>
</ul>
@@ -487,99 +489,95 @@
<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
+not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way that hurts the user.
+But they are a lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> Apple
+<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways</em></ins></span> that harm <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>them or block their work.</p>
<ul class="blurbs">
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance
of older phones to force users to buy their newer
+ the <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>performance</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
+ Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> to
<span class="inserted"><ins><em>block
- Telegram in Russia.</p>
+ <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span
class="removed"><del><strong>software.</p>
- <p>The Telegram client is free software on other platforms, but not
on
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>to block
+ Telegram in Russia.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
+ <span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+ to APFS</a>, which
cannot be
- accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
<li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs for older model iThings</a>.</p>
+ bugs</em></ins></span> for <span class="removed"><del><strong>music files,
copies them</strong></del></span> <span class="inserted"><ins><em>older model
iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple <span
class="inserted"><ins><em>stops people from fixing problems themselves;
- that's the nature of proprietary</em></ins></span> software.</p>
-
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em></li>
+ <p>Meanwhile, Apple stops people from fixing problems themselves;
+ that's the nature of proprietary software.</p>
+ </li>
<li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains DRM specifically designed to <a
+ iPhone 7 contains DRM specifically designed</em></ins></span> to <span
class="inserted"><ins><em><a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick it if an “unauthorized” repair shop fixes it</a>.
+ brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
+ server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>“unauthorized” repair shop fixes
it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+ handcuffs</a>.</p></em></ins></span>
</li>
- <li id="M201606080">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080"></em></ins></span>
<p>Apple <a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></em></ins></span>
stops users from fixing the security bugs in Quicktime for
Windows</a>,
while refusing to fix them itself.</p>
</li>
- <li id="M201605040"></em></ins></span>
- <p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605040">
+ <p>The Apple Music client program <a
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
the user's file system for music files, copies them to an Apple server,
and deletes them</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Apple <a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops users from fixing the security bugs in Quicktime for
- Windows</a>, while refusing to fix them itself.</p>
- </li>
-
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201602050"></em></ins></span>
+ <li id="M201602050"></em></ins></span>
<p>iOS version 9 for iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
Apple</a>. Apple eventually backed off from this policy under
- criticism from the users. However, it has not acknowledged that this
+ criticism from the <span class="removed"><del><strong>users. However, it
has not acknowledged</strong></del></span> <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
was wrong.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510020">
+ <li id="M201510020">
<p>Apple forced millions of iThings to <a
href="https://discussions.apple.com/thread/7256669?tstart=0">download
a system upgrade without asking the users</a>. Apple did not
@@ -590,11 +588,14 @@
<li id="M201412040">
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
+ deleted from iPods the music</em></ins></span> that
+ <span class="removed"><del><strong>this was
wrong.</p></strong></del></span> <span class="inserted"><ins><em>users
had got from internet music
+ stores that competed with iTunes</a>.</p></em></ins></span>
</li>
- <li id="M200709270">
+ <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200709270">
<p><a
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></em></ins></span>
An Apple firmware “upgrade” bricked iPhones that had been
@@ -618,10 +619,27 @@
track iMonsters even when they are suspended</a>.</p>
<p>This distributed bluetooth network is said to be
- “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span class="removed"><del><strong>iPods the
music that users had got</strong></del></span>
- <span class="inserted"><ins><em>Apple or</em></ins></span> from <span
class="removed"><del><strong>internet music
- stores</strong></del></span> <span
class="inserted"><ins><em>governments</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can command Apple's obedience (such
- as the US and China).</p></em></ins></span>
+ “secure,” but it is obviously <em>not</em>
secure</em></ins></span> from <span
class="removed"><del><strong>iPods</strong></del></span>
+ <span class="inserted"><ins><em>Apple or from governments that can command
Apple's obedience (such
+ as</em></ins></span> the <span
class="removed"><del><strong>music</strong></del></span> <span
class="inserted"><ins><em>US and China).</p>
+ </li>
+
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>users had got from internet music
+ stores</strong></del></span> <span class="inserted"><ins><em>are busy at
night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely</em></ins></span> that <span
class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -992,7 +1010,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-apple.nl.po 7 Jun 2019 08:33:53 -0000 1.60
+++ malware-apple.nl.po 10 Jun 2019 09:02:20 -0000 1.61
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -935,6 +935,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-apple.pot 7 Jun 2019 08:33:53 -0000 1.72
+++ malware-apple.pot 10 Jun 2019 09:02:20 -0000 1.73
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -650,6 +650,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">
"
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a "
"href=\"https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history\">reports
"
"the user's browsing history</a>."
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- malware-apple.ru.po 7 Jun 2019 09:33:33 -0000 1.199
+++ malware-apple.ru.po 10 Jun 2019 09:02:20 -0000 1.200
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
#. type: Content of: <title>
msgid ""
@@ -919,6 +920,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-mobiles.de-diff.html 8 Jun 2019 08:31:13 -0000 1.56
+++ malware-mobiles.de-diff.html 10 Jun 2019 09:02:20 -0000 1.57
@@ -403,7 +403,7 @@
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant</strong></del></span> <span class="inserted"><ins><em>these apps
are proprietary it makes it
- hard</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>impossible to know which apps are at risk.</p>
+ hard to impossible to know which apps are at risk.</p>
</li>
<li id="M201405190">
@@ -507,6 +507,23 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -860,7 +877,7 @@
<dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track</em></ins></span> users and show them targeted
ads.</dd>
+ meant</em></ins></span> to track users and show them targeted
ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -883,125 +900,122 @@
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML <span
class="removed"><del><strong>pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
+ <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
+ the <span class="removed"><del><strong>non-premium version
of</strong></del></span> <span class="inserted"><ins><em>non-premium version of
the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
-</li>
-
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It</strong></del></span> <span class="inserted"><ins><em>pages,
and</em></ins></span> also uses <span class="inserted"><ins><em>roughly
- five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
- the <span class="removed"><del><strong>ugly word “monetize”.
A good replacement</strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection</em></ins></span> for <span class="removed"><del><strong>that word is
“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
- </dl></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611150">
- <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-</li>
-
-<li>
- <p>Faceapp appears to do</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by</strong></del></span>
<span class="inserted"><ins><em>data to China</a>.</p>
+ <li id="M201611150">
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201606050">
- <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you</em></ins></span> to <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>share the picture you take according to who
is</em></ins></span>
- in the <span class="removed"><del><strong>device</a>.
- </p>
- </li>
-
-<li>
- <p>Pairs of Android apps can collude</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> <span
class="inserted"><ins><em>require online access to some
+ <p>This spyware feature seems to require online access to some
known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ sent across</em></ins></span> the <span class="removed"><del><strong>app
does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and
<span class="removed"><del><strong>display ads.</dd>
+ </dl>
+</li>
+
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none of Facebook</em></ins></span> users' <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
- even if the user didn't “upload” them</em></ins></span> to
<span class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>the service.</p>
+ <p>If so, none</em></ins></span> of <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+ even if</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them to</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>service.</p>
</li>
<li id="M201605310">
- <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In
addition,</em></ins></span>
+ it <span class="removed"><del><strong>was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of</strong></del></span> <span class="inserted"><ins><em>may be
analyzing people's conversations to serve</em></ins></span> them <span
class="removed"><del><strong>are</strong></del></span> <span
class="inserted"><ins><em>with targeted
advertisements.</p>
</li>
<li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
- it can alter them too</a>.</p>
+ <p>A pregnancy test controller application</em></ins></span> not
<span class="removed"><del><strong>in fact</strong></del></span> <span
class="inserted"><ins><em>only can</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>phone, and in server accounts,
+ it can alter them too</a>.</p></em></ins></span>
</li>
- <li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude.</a></p></strong></del></span>
<span class="inserted"><ins><em>include <a
-
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>track users by</strong></del></span> <span
class="inserted"><ins><em>include</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played
by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and</em></ins></span>
TV <span class="removed"><del><strong>programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>programs
are playing nearby</a>. Also on what users post on various sites
such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+ <p>Faceapp appears to do lots</strong></del></span>
<span class="inserted"><ins><em><li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by</strong></del></span>
<span class="inserted"><ins><em>monitoring
+ people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't
“fool”</em></ins></span>
- the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
+ the <span class="removed"><del><strong>device</a>.
+ </p>
</li>
- <li id="M201511190">
- <p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+<li>
+ <p>Pairs of Android apps can collude to transmit users' personal data
+ to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude.</a></p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not enough
-to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
+ <span class="inserted"><ins><em><li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated to the app's functionality, was</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</em></ins></span> the <span class="removed"><del><strong>personal
details of users</strong></del></span> <span class="inserted"><ins><em>500 most
popular gratis Android apps</a>.</p>
- <p>The article should not</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
+ <p>The article should not have described these apps as
“free”—they are not free software. The clear way
to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
- legitimate, but is</em></ins></span> that <span
class="removed"><del><strong>spell out</strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
- analyze</em></ins></span> what <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+ <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking</strong></del></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>usual analytics
tools are
+ legitimate, but</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>that valid? Software developers have no
right</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most</strong></del></span>
+ <span class="inserted"><ins><em>analyze what</em></ins></span> users <span
class="removed"><del><strong>have
+stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>are doing or how. “Analytics”
tools</em></ins></span>
+ that <span class="removed"><del><strong>spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
and honestly identify the information it collects on users, instead
of hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>doing or how.
“Analytics” tools
- that snoop are just as wrong as any</em></ins></span> other <span
class="removed"><del><strong>companies from getting this personal information
in the first
+and</strong></del></span> <span class="inserted"><ins><em>just as wrong as
any</em></ins></span> other <span class="removed"><del><strong>companies from
getting this personal information in the first
place!</p></strong></del></span> <span
class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
@@ -1037,11 +1051,11 @@
smartphones</a> by sending hidden text messages which enable
them to turn</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
and <span class="inserted"><ins><em>off, listen to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>GPS, take photographs, read
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware</em></ins></span> is
+ read the contact list. This malware</em></ins></span> is
<span class="removed"><del><strong>still spyware.</p>
</li>
<li><p>The Meitu photo-editing
@@ -1362,7 +1376,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/08 08:31:13 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-mobiles.de.po 8 Jun 2019 08:31:13 -0000 1.113
+++ malware-mobiles.de.po 10 Jun 2019 09:02:20 -0000 1.114
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -835,6 +835,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- malware-mobiles.es.po 9 Jun 2019 10:41:21 -0000 1.129
+++ malware-mobiles.es.po 10 Jun 2019 09:02:20 -0000 1.130
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -716,6 +717,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-mobiles.fr.po 8 Jun 2019 16:55:38 -0000 1.154
+++ malware-mobiles.fr.po 10 Jun 2019 09:02:20 -0000 1.155
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-06-08 18:55+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -716,6 +717,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.it-diff.html 8 Jun 2019 08:31:13 -0000 1.61
+++ malware-mobiles.it-diff.html 10 Jun 2019 09:02:20 -0000 1.62
@@ -136,9 +136,9 @@
<p>Google can also <a
href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
title="at</strong></del></span> <span class="inserted"><ins><em>communication
with</em></ins></span> the <span class="removed"><del><strong>Wayback Machine
(archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article,
to have
-been merged into Google Play). This adds up</strong></del></span> <span
class="inserted"><ins><em>network, there is no way
- to stop the network from recording its location. Many countries
+install apps</a> through GTalkService (which seems, since that
article,</strong></del></span> <span class="inserted"><ins><em>network, there
is no way</em></ins></span>
+ to <span class="removed"><del><strong>have
+been merged into Google Play). This adds up</strong></del></span> <span
class="inserted"><ins><em>stop the network from recording its location. Many
countries
(including the US and the EU) require the network</em></ins></span> to
<span class="inserted"><ins><em>store all
these location data for months or years.</p>
</li>
@@ -242,8 +242,8 @@
that <span class="removed"><del><strong>this
does</strong></del></span> <span class="inserted"><ins><em>impose censorship
on application programs.</li>
<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system</em></ins></span> not <span
class="removed"><del><strong>operate via</strong></del></span> <span
class="inserted"><ins><em>“authorized” by</em></ins></span> the
- <span class="inserted"><ins><em>manufacturer.</li>
+ that reject any operating system</em></ins></span> not <span
class="removed"><del><strong>operate via</strong></del></span> <span
class="inserted"><ins><em>“authorized” by the
+ manufacturer.</li>
</ul>
</div>
@@ -251,7 +251,7 @@
<ul>
<li>
- <p>See above for the <a
href="#universal-back-door">general</em></ins></span> universal back <span
class="removed"><del><strong>door that we know nearly</strong></del></span>
+ <p>See above for</em></ins></span> the <span
class="inserted"><ins><em><a
href="#universal-back-door">general</em></ins></span> universal back <span
class="removed"><del><strong>door that we know nearly</strong></del></span>
<span class="inserted"><ins><em>door</a> in
essentially</em></ins></span> all
<span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>mobile phones, which permits converting
them into full-time listening devices.</p>
@@ -532,6 +532,23 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -1099,45 +1116,45 @@
twisted ways that they present snooping as</em></ins></span> a <span
class="removed"><del><strong>server, where the <em>developer</em>
gets it all.</strong></del></span> <span class="inserted"><ins><em>way to
“serve”
users better</a>—never mind whether they want
that.</em></ins></span> This <span
class="removed"><del><strong>“service”</strong></del></span> is
<span class="removed"><del><strong>for suckers!</p>
-<p>The server surely has</strong></del></span> a <span
class="removed"><del><strong>“privacy policy,”</strong></del></span>
- <span class="inserted"><ins><em>typical example of the attitude of the
proprietary software industry
+<p>The server surely has</strong></del></span> a <span
class="removed"><del><strong>“privacy policy,” and surely it
+is worthless since nearly all</strong></del></span>
+ <span class="inserted"><ins><em>typical example</em></ins></span> of <span
class="removed"><del><strong>them are.</p></strong></del></span> <span
class="inserted"><ins><em>the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>surely it</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
- transmission</em></ins></span> is <span
class="removed"><del><strong>worthless since nearly all</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
- not wanted or requested by the user, clearly must constitute
spying</em></ins></span>
- of <span class="removed"><del><strong>them
are.</p></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs are
+ playing nearby</a>. Also on what</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that</em></ins></span> users <span class="removed"><del><strong>post on
various sites such as
+ Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% and
47%</strong></del></span>
<span class="inserted"><ins><em><li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found</em></ins></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs are
- playing nearby</a>. Also on what users post on various sites
such</strong></del></span> <span class="inserted"><ins><em>90% of the
top-ranked gratis proprietary
+ study in 2015</a> found that 90%</em></ins></span> of <span
class="removed"><del><strong>mobile applications, both
from</strong></del></span> <span class="inserted"><ins><em>the top-ranked
gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
- <p>The article confusingly describes gratis apps</em></ins></span>
as
- <span class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span>
- <span class="inserted"><ins><em>“free”, but most of them are
not in fact <a
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% and 47%
of mobile applications, both from</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>and iOS
respectively</strong></del></span> <span class="inserted"><ins><em>apps (but
not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
behavioral</strong></del></span>
@@ -1392,7 +1409,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/08 08:31:13 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-mobiles.it.po 8 Jun 2019 08:31:13 -0000 1.113
+++ malware-mobiles.it.po 10 Jun 2019 09:02:20 -0000 1.114
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -796,6 +796,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-mobiles.ja-diff.html 8 Jun 2019 08:31:13 -0000 1.75
+++ malware-mobiles.ja-diff.html 10 Jun 2019 09:02:20 -0000 1.76
@@ -329,7 +329,7 @@
<p>This is in addition</em></ins></span> to <span
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a
<span class="removed"><del><strong>server, where</strong></del></span> <span
class="inserted"><ins><em>cellular
modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong><em>developer</em>
gets</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>all.
-This “service” is for</strong></del></span> <span
class="inserted"><ins><em>is. If you own
+This “service” is</strong></del></span> <span
class="inserted"><ins><em>is. If you own
such a car, it would be wise to disconnect the modem so as to turn
off the tracking.</p>
</li>
@@ -366,7 +366,7 @@
blatant flaws allowed anyone to snoop on a user's personal data</a>.
The critique fails entirely to express concern that the app sends the
personal data to a server, where the <em>developer</em> gets
it all.
- This “service” is for</em></ins></span> suckers!</p>
+ This “service” is</em></ins></span> for suckers!</p>
<p>The server surely has a “privacy policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
it is worthless since nearly all of them are.</p>
@@ -499,6 +499,23 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -1231,7 +1248,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/08 08:31:13 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-mobiles.ja.po 8 Jun 2019 08:31:13 -0000 1.101
+++ malware-mobiles.ja.po 10 Jun 2019 09:02:20 -0000 1.102
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -661,6 +661,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-mobiles.pot 8 Jun 2019 08:31:13 -0000 1.79
+++ malware-mobiles.pot 10 Jun 2019 09:02:20 -0000 1.80
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -487,6 +487,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">
"
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a "
"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
"requirement to run a proprietary phone app</a> to be allowed into the event."
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- malware-mobiles.ru.po 8 Jun 2019 10:32:34 -0000 1.187
+++ malware-mobiles.ru.po 10 Jun 2019 09:02:20 -0000 1.188
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-06-08 08:26+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -706,6 +707,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- nl.po 8 Jun 2019 08:31:13 -0000 1.95
+++ nl.po 10 Jun 2019 09:02:20 -0000 1.96
@@ -1427,6 +1427,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- pl.po 8 Jun 2019 08:31:13 -0000 1.95
+++ pl.po 10 Jun 2019 09:02:20 -0000 1.96
@@ -1164,6 +1164,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- pot 8 Jun 2019 08:31:13 -0000 1.94
+++ pot 10 Jun 2019 09:02:20 -0000 1.95
@@ -1026,6 +1026,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary-surveillance.de-diff.html 7 Jun 2019 08:33:53 -0000
1.77
+++ proprietary-surveillance.de-diff.html 10 Jun 2019 09:02:20 -0000
1.78
@@ -651,7 +651,13 @@
for other apps and also core system logs. TigerVPN
developers</strong></del></span> have <span
class="removed"><del><strong>confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>GPS.)</p>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ and may turn them over to the UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection</strong></del></span>
<span class="inserted"><ins><em>GPS.)</p>
</li>
</ul>
@@ -667,414 +673,535 @@
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
track iMonsters even when they are suspended</a>.</p>
- <p>This distributed bluetooth network is said</em></ins></span> to
<span class="removed"><del><strong>LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>be
- “secure,” but</em></ins></span> it <span
class="removed"><del><strong>stores detailed logs
- and may turn them over to</strong></del></span> <span
class="inserted"><ins><em>is obviously <em>not</em> secure from
- Apple or from governments that can command Apple's obedience (such
- as</em></ins></span> the <span class="removed"><del><strong>UK government
if
- requested.</dd>
+ <p>This distributed bluetooth network</em></ins></span> is <span
class="inserted"><ins><em>said</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be
+ “secure,” but</em></ins></span> it <span
class="removed"><del><strong>redirects the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</strong></del></span> <span
class="inserted"><ins><em>US and China).</p>
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed</strong></del></span> <span class="inserted"><ins><em>is
obviously <em>not</em> secure from
+ Apple or from governments</em></ins></span> that <span
class="inserted"><ins><em>can command Apple's obedience (such
+ as</em></ins></span> the <span class="removed"><del><strong>non-premium
version of the app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>US</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span
class="inserted"><ins><em>China).</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <li id="M201711250">
- <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>HTML pages returned</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this would require circumventing</em></ins></span> the
- <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
+ proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third
parties</a>.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
+ trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
+ used for.</p></em></ins></span>
</li>
- <li id="M201709210">
- <p>In</em></ins></span> the <span class="removed"><del><strong>JS
injection is</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>without having your fingerprints taken. Users would
have
- no way to tell whether</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
+ no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
- them from there.</p>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p></em></ins></span>
</li>
- <li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>have
- confirmed</strong></del></span> <span class="inserted"><ins><em>on
iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that the <span
class="removed"><del><strong>non-premium version of</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>app does
- JavaScript injection</strong></del></span>
- <span class="inserted"><ins><em>server records these
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and
display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>at least
30 days.</p></em></ins></span>
- </li>
<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span>
+<p>Google Play intentionally sends</strong></del></span>
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>paid proprietary
apps, it was only 60%.</p>
+ <span class="inserted"><ins><em><li id="M201609280">
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ </li>
+
+ <li id="M201509240">
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>Conditions” that spell out
+what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
- <p>The article confusingly describes gratis apps as “free”,
- but most of</strong></del></span> <span class="inserted"><ins><em>photos
- and videos they make.</p>
-
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up
to date on all your devices. Any edits you
- make</em></ins></span> are <span class="removed"><del><strong>not in
fact</strong></del></span> <span class="inserted"><ins><em>automatically
updated everywhere. […] </p></blockquote>
-
- <p>(From</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>make.</p>
-<li>
- <p>Apps for BART</strong></del></span>
- <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
+ <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>other companies
from getting this personal information in the first
+place!</p>
</li>
-<li>
- <p>A study found 234 Android apps that track
users</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by
- <span class="removed"><del><strong><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>the
- startup of iOS</a>. The term “cloud” means “please
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if</strong></del></span> <span
class="inserted"><ins><em>video</em></ins></span> you <span
class="removed"><del><strong>disable Google Maps</strong></del></span>
+ <span class="inserted"><ins><em>take,</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ make are automatically updated everywhere. […]
</p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
+ <span class="removed"><del><strong>yet another
example</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or
played</strong></del></span>
+ <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when</strong></del></span>
<span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
- </p>
+ iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
+ unthinkable with free software.</p>
-</li>
+ </li>
-<li>
- <p>Pairs</strong></del></span> <span class="inserted"><ins><em>default
so it still counts as a
- surveillance functionality.</p>
+ <li><p>More than 73%</strong></del></span>
+ <span class="inserted"><ins><em>surveillance functionality.</p>
- <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>Android apps can collude to transmit users'
personal
- data</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
+ <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>pairs
that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
- security to get at them, but NSA can access any</em></ins></span> of <span
class="removed"><del><strong>users that install the app</a>.</p>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
+ </li>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>break Apple's
+ security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>“consent” of users
is</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
- <p>This may have improved with <a
+ <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+
+ <p>This may</em></ins></span> have <span
class="removed"><del><strong>described these apps as
+ “free”—they are</strong></del></span> <span
class="inserted"><ins><em>improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>enough</strong></del></span> <span
class="inserted"><ins><em>as much as Apple claims</a>.</p>
+ not <span class="removed"><del><strong>free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple
claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>“Terms and
Conditions” that spell out
-what they are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
+ for <span class="removed"><del><strong>granted that the usual analytics
tools are
+ legitimate, but is that valid? Software developers
have</strong></del></span> no <span class="removed"><del><strong>right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>possible purpose</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not</strong></del></span> <span
class="inserted"><ins><em>than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect to 100</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
<span class="inserted"><ins><em>get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all the data in an iThing, or it
+ Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
+ turned off.</p></em></ins></span>
</li>
- <li id="M201210170">
- <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
- still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
+ <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201210170">
+ <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it is
+ still true in iOS 7.)</p></em></ins></span>
</li>
- <li id="M201204280">
- <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a</strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
- to it.</p>
+ to <span class="removed"><del><strong>any file on</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving a valid
+ email address and receiving</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
+ to it.</p></em></ins></span>
</li>
</ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 id="SpywareInAndroid">Android Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make
it</strong></del></span> <span class="inserted"><ins><em>movements of Android
phones, and sometimes</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software in the phone has</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>location
data to Google.</p></em></ins></span>
</li>
- <li id="M201812060">
+ <span
class="removed"><del><strong><li><p>In</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the <span class="removed"><del><strong>latest
iThings system, “turning off” WiFi and
Bluetooth</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>location data while in
+ airplane mode. Instead,</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data, and sent</em></ins></span> them <span
class="removed"><del><strong>off—only until 5am.
+ That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>all
later</a>.</p></em></ins></span>
</li>
- <li id="M201711210">
- <p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711210">
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
when</em></ins></span>
+ the phone <span class="removed"><del><strong>is snooping on
+ them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>has no SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>personal</strong></del></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
- <li id="M201609140">
- <p>Google Play (a</em></ins></span> component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ <span class="inserted"><ins><em><li id="M201609140">
+ <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into
it</a>;</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a></strong></del></span> <span
class="inserted"><ins><em>users' movements</em></ins></span> without <span
class="removed"><del><strong>giving a valid email address</strong></del></span>
<span class="inserted"><ins><em>their permission</a>.</p>
+
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>receiving the code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>location
tracking, you must
+ disable Google Play itself</em></ins></span> to <span
class="removed"><del><strong>it.</p>
+ </li>
+
+ <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>completely stop</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>tracking. This is
+ yet another example</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and
+ <span class="removed"><del><strong>videos</strong></del></span> they
<span class="removed"><del><strong>make.</p>
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p></strong></del></span>
- <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
- </li>
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>send so much data
that their
+ transmission</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
+ not wanted or requested</em></ins></span> by the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+ of <span class="removed"><del><strong>iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+ <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>some kind.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>system.</p>
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active</strong></del></span> <span
class="inserted"><ins><em>any file on the system.</p>
</li>
<li id="M201308010">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us</em></ins></span> by <span
class="removed"><del><strong>default so it still counts
as</strong></del></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
- <p>The article should not have described these apps as
- “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
- “zero price” is “gratis.”</p>
+ <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
- Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ <li><p>Spyware in iThings:</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>FBI can remotely
activate</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>GPS</em></ins></span>
and <span class="removed"><del><strong>get other info too.</p>
</li>
- <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
- and <span class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a>. (I suspect this means Windows
laptops.) Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
+
+ <li><p>There is also a feature for web sites to track users,
which</strong></del></span> <span class="inserted"><ins><em>microphone in
Android phones
+ and laptops</a>. (I suspect this means Windows laptops.)
Here</em></ins></span> is <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is present in some Android devices when
they are
- sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
- by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- <span class="removed"><del><strong>send</strong></del></span>
- <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
+ <li id="M201307280">
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>still true</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
</li>
- <span
class="removed"><del><strong><li><p>Some</strong></del></span>
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a></strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
+ sold. Some Motorola phones, made when this company was
owned</em></ins></span>
+ by <span class="removed"><del><strong>default,
though</strong></del></span> <span class="inserted"><ins><em>Google, use a
modified version of Android</em></ins></span> that <span
class="removed"><del><strong>can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201307250">
+ <li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens</em></ins></span> for <span class="inserted"><ins><em>voice
all</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
-
- <p>Merely asking the “consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <span class="inserted"><ins><em><li id="M201302150">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>personal details of
users that install</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it is totally incompetent.</a></p>
</li>
- <li id="M201111170">
- <p>Some</em></ins></span> manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
- </li>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
+ <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>iOS seem to exist for no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> is <span
class="inserted"><ins><em>not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading</em></ins></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<ul>
+ <li><p>Tracking software in popular Android apps is
pervasive</strong></del></span> <span
class="inserted"><ins><em>“Terms</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
-</div>
+ <li><p>Android tracks location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services”</strong></del></span> <span
class="inserted"><ins><em>Conditions” that spell out what
+ they</em></ins></span> are <span class="removed"><del><strong>turned off,
even
+ when</strong></del></span> <span
class="inserted"><ins><em>“consenting” to. Google should clearly
and
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
-<span class="removed"><del><strong><ul>
- <li><p>The DMCA</strong></del></span>
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span> <span
class="inserted"><ins><em>information it collects on users,
instead</em></ins></span> of <span class="removed"><del><strong>data to
China</a>.</p></li>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201603080">
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>the EU Copyright Directive make
it</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>,
because</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes</em></ins></span> this
- <span class="removed"><del><strong>would require circumventing the iOS
DRM.</p>
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>turn the phones
+ on</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google</em></ins></span>
+ and <span class="removed"><del><strong>off, listen to the microphone,
retrieve geo-location data</strong></del></span> <span
class="inserted"><ins><em>other companies</em></ins></span> from <span
class="inserted"><ins><em>getting this personal information
in</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read the contact list. This malware is designed to
+ disguise itself from investigation.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
</li>
- <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>code
snoops on readers</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>phone is snooping on
- them.</p></li>
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of <span
class="removed"><del><strong>personal</strong></del></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></em></ins></span>
+<ul class="blurbs">
+ <li id="M201603080">
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
+ </li>
+
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></em></ins></span>
+ send <span class="removed"><del><strong>so much</strong></del></span>
<span class="inserted"><ins><em>lots of</em></ins></span> data <span
class="removed"><del><strong>that their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by</strong></del></span> <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
+ <li id="M201212030">
+ <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span>
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the user <span
class="removed"><del><strong>types into it</a>; the server records these
numbers for</strong></del></span> <span
class="inserted"><ins><em>reads</em></ins></span> at <span
class="removed"><del><strong>least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>what time</a>.</p></em></ins></span>
+ report even which page</em></ins></span> the <span
class="inserted"><ins><em>user reads at what</em></ins></span>
time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
+ <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows?
laptops):</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1086,577 +1213,458 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it</em></ins></span> even <span class="removed"><del><strong>gratis
apps)</a>
- without giving</strong></del></span> <span
class="inserted"><ins><em>more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not</em></ins></span> a <span class="removed"><del><strong>valid email
address and receiving</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends to it.</p>
- </li>
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running
it</a>.</em></ins></span> The <span class="removed"><del><strong>Wall
+ Street Journal (in an article blocked from us by</strong></del></span>
<span class="inserted"><ins><em>result is
+ often</em></ins></span> a <span class="removed"><del><strong>paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot of money.</p>
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for</em></ins></span> the <span class="removed"><del><strong>most
popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ <p>The fact</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect</strong></del></span> this <span
class="removed"><del><strong>means Windows laptops.)
Here</strong></del></span> is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>iThings automatically upload to Apple's servers all the
photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot</em></ins></span> make <span
class="removed"><del><strong>are automatically updated everywhere. [...]
- </p></blockquote>
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says</strong></del></span> <span class="inserted"><ins><em>used
for repression of forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>will
eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
+ <li><p>The</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
- <p>There</strong></del></span> <span class="inserted"><ins><em>it
less nasty.</p>
+ <p>This illustrates that making unauthorized copies
of</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat app's
principal purpose</strong></del></span> <span
class="inserted"><ins><em>software</em></ins></span>
+ is <span class="removed"><del><strong>to restrict</strong></del></span>
<span class="inserted"><ins><em>not a cure for</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>data on</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying for</em></ins></span> the <span class="removed"><del><strong>user's
computer,</strong></del></span> <span class="inserted"><ins><em>nasty
thing,</em></ins></span> but <span class="inserted"><ins><em>cannot
make</em></ins></span> it <span class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<ul class="blurbs">
- <li id="M201905300">
- <p>The Femm “fertility” app</em></ins></span> is <span
class="inserted"><ins><em>secretly</em></ins></span> a <span
class="removed"><del><strong>way to</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a></em></ins></span> by <span
class="removed"><del><strong>default so it still counts</strong></del></span>
<span class="inserted"><ins><em>natalist Christians. It spreads distrust
- for contraception.</p>
-
- <p>It snoops on users, too,</em></ins></span> as <span
class="inserted"><ins><em>you must expect from nonfree
- programs.</p>
- </li>
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201905300"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Femm “fertility”</em></ins></span> app
<span class="removed"><del><strong>and dis-service spy on users even more than
users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to</strong></del></span>
<span class="inserted"><ins><em>is secretly</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
+ </p>
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They
needed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>break
Apple's
- security</strong></del></span> <span class="inserted"><ins><em>run a
proprietary phone app</a></em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>be allowed into
- the event.</p>
+ <p>Don't be tracked — pay cash!</p>
+ </li>
- <p>This app is a spyware that</em></ins></span> can <span
class="removed"><del><strong>access any</strong></del></span> <span
class="inserted"><ins><em>snoop on a lot</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
+ for contraception.</p>
- <li><p>Spyware in iThings:
- the</strong></del></span>
- <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it</strong></del></span> <span class="inserted"><ins><em>menstrual and
pregnancy monitoring apps</em></ins></span> is <span
class="removed"><del><strong>still true in iOS 7.)</p>
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary</em></ins></span> phone <span
class="removed"><del><strong>numbers and email addresses</a> in user's
address
+ book</strong></del></span> <span
class="inserted"><ins><em>app</a></em></ins></span> to <span
class="removed"><del><strong>developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
</li>
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>often</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>.
Even</em></ins></span> though <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>the
- data is “anonymized and aggregated,” it</em></ins></span> can
<span class="inserted"><ins><em>easily</em></ins></span> be
- <span class="removed"><del><strong>turned off.</p>
- </li>
+ <li>
+ <p>Facebook's</strong></del></span> <span
class="inserted"><ins><em>event.</p>
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
+ <p>This</em></ins></span> app <span
class="removed"><del><strong>listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
<span class="inserted"><ins><em>is a spyware that can</em></ins></span> snoop
on <span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
- or it is totally incompetent.</a></p>
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span class="removed"><del><strong>or
watching</a>. In addition,</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though the
+ data is “anonymized and aggregated,”</em></ins></span> it
<span class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>can easily</em></ins></span> be <span
class="removed"><del><strong>analyzing people's
conversations</strong></del></span>
+ <span class="inserted"><ins><em>traced back</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to
exist</strong></del></span> <span class="inserted"><ins><em>app.</p>
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>the woman who uses the app.</p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
+ <p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less</em></ins></span> the
- <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ these apps, even if someone offers you a reward</em></ins></span> to do
<span class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em>so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p>
</li>
-</ul>
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging
by</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have</em></ins></span> access <span
class="removed"><del><strong>it demands</strong></del></span> to <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>sensitive</em></ins></span> data <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>device</a>.
+ </p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install</strong></del></span> on <span
class="removed"><del><strong>some of its phones. The app will give Verizon the
same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
-<ul>
- <li><p>Tracking software in popular Android
apps</strong></del></span> <span class="inserted"><ins><em>same thing without
- spying on you</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
- a <span class="removed"><del><strong>physical store by noticing WiFi
- networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>new one is being
developed</a>.</p></em></ins></span>
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>have access to</em></ins></span>
+ the <span class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to the data. This
results in massive
+ surveillance</em></ins></span> on <span class="removed"><del><strong>only
one phone</a>, and</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>has absolutely no control.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android</em></ins></span> phones <span
class="removed"><del><strong><a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold</strong></del></span> <span
class="inserted"><ins><em>come</em></ins></span> with <span
class="removed"><del><strong>spyware sending lots</strong></del></span> <span
class="inserted"><ins><em>a huge number</em></ins></span> of <span
class="removed"><del><strong>data to China</a>.</p></li>
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
- <li><p>According to Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>data, or pass it</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps that have
access</em></ins></span> to
- the <span class="removed"><del><strong>microphone, retrieve geo-location
data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>data.</em></ins></span> This <span
class="removed"><del><strong>malware is designed to
- disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>results in massive
- surveillance on which the user has absolutely no
control.</p></em></ins></span>
- </li>
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in the phone, and in server
accounts,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> it <span
class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>users can't delete</a>,
- and they</strong></del></span> <span class="inserted"><ins><em>19 of
them <a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
- send <span class="removed"><del><strong>so much</strong></del></span>
<span class="inserted"><ins><em>sensitive personal</em></ins></span> data <span
class="inserted"><ins><em>to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+ <p>This example illustrates how “getting the user's
consent”</strong></del></span>
+ for <span class="removed"><del><strong>surveillance is inadequate as a
protection</strong></del></span> <span class="inserted"><ins><em>invasive
advertising or discriminating</em></ins></span> against <span
class="removed"><del><strong>massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>are difficult to understand. In any case,
- “consent”</em></ins></span> is <span
class="inserted"><ins><em>not sufficient to legitimize snooping.</p>
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <li id="M201902230">
- <p>Facebook offered</em></ins></span> a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>convenient
proprietary
- library</em></ins></span> for <span class="removed"><del><strong>users.
Said transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that</em></ins></span> all
the <span class="removed"><del><strong>time</a>.</p>
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go to Facebook as well.</p>
+ <li><p>Apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such</strong></del></span> <span class="inserted"><ins><em>released
them, apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>well.</p>
- <p>It shows</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span> <span class="inserted"><ins><em>no
one</em></ins></span> can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span class="inserted"><ins><em>trust a nonfree
program, not even</em></ins></span> the <span class="removed"><del><strong>GPS
and microphone in</strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
</li>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how</em></ins></span> Android
- <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>apps use</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span>
<span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
- <li><p>Portable phones with GPS will send their GPS location on
- remote command</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
- </li>
+ <p>Collecting hardware identifiers</em></ins></span> is in <span
class="removed"><del><strong>the frame.</p>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>hardware
identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ <p>This spyware feature</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ Google's policies. But it</em></ins></span> seems <span
class="inserted"><ins><em>that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>take
action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>wire to
Facebook's servers and face-recognition
+ algorithms.</p>
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="inserted"><ins><em>in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer, but it
does</strong></del></span> <span class="inserted"><ins><em>a development
platform are ineffective at
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>a development platform</em></ins></span> are
<span class="removed"><del><strong>private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a</em></ins></span> surveillance
- <span class="removed"><del><strong>too:</strong></del></span> <span
class="inserted"><ins><em>feature for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p>
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based</strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The moviepass app and dis-service spy</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
- </li>
-
- <li id="M201902041.1">
+ <span class="inserted"><ins><em><li id="M201902041.1">
<p>Twenty nine “beauty camera” apps that used to
- be</em></ins></span> on <span class="removed"><del><strong>users
even</strong></del></span> <span class="inserted"><ins><em>Google Play had one
or</em></ins></span> more <span class="removed"><del><strong>than users
- expected. It</strong></del></span> <span
class="inserted"><ins><em>malicious functionalities, such as</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</strong></del></span>
+ be</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>after going to a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>often
malicious ads on users, and redirecting
+ them</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>phishing sites</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is a typical example</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of
+ <span class="removed"><del><strong>the attitude</strong></del></span>
<span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ those they have subjugated.</p>
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ <p>Out, out, damned Spotify!</p>
</li>
-
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span> <span
class="inserted"><ins><em>often malicious ads on users,</em></ins></span> and
<span class="removed"><del><strong>email addresses</a> in user's address
- book</strong></del></span> <span class="inserted"><ins><em>redirecting
- them</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note</strong></del></span> <span class="inserted"><ins><em>phishing
sites</em></ins></span> that <span class="removed"><del><strong>this article
misuses</strong></del></span> <span class="inserted"><ins><em>stole their
credentials. Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed</em></ins></span> to <span
class="removed"><del><strong>zero price.</p></strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ <li><p>Many proprietary</strong></del></span> <span
class="inserted"><ins><em>them was designed to make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ <p>Users should of course uninstall these
dangerous</em></ins></span> apps <span class="removed"><del><strong>for mobile
devices report which other</strong></del></span> <span
class="inserted"><ins><em>if they
+ haven't yet, but they should also stay away from nonfree</em></ins></span>
apps <span class="removed"><del><strong>the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span> in
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>potential risk
because
+ there</em></ins></span> is <span class="removed"><del><strong>visible and
+ optional</a>. Not as bad as</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span
class="removed"><del><strong>the others</strong></del></span> <span
class="inserted"><ins><em>they really</em></ins></span> do.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Facebook's app listens all</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
<span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>or
watching</a>.</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks.</em></ins></span> In
- addition, <span class="removed"><del><strong>it may</strong></del></span>
<span class="inserted"><ins><em>85% feature intrusive permissions or functions
in their
- source code—often used for invasive advertising—that could
- potentially also</em></ins></span> be <span
class="removed"><del><strong>analyzing people's conversations to serve them
with targeted
- advertisements.</p>
+ <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
+ gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging
by</strong></del></span> <span class="inserted"><ins><em>spy on users. Other
technical flaws were
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data
in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon</strong></del></span> <span class="inserted"><ins><em>top
10 gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
+
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
<li id="M201901050">
- <p>The Weather Channel</em></ins></span> app <span
class="inserted"><ins><em><a
+ <p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>notify the users</em></ins></span> of <span
class="removed"><del><strong>its phones. The app</strong></del></span> <span
class="inserted"><ins><em>what it</em></ins></span> will <span
class="removed"><del><strong>give Verizon</strong></del></span> <span
class="inserted"><ins><em>do
- with</em></ins></span> the <span class="removed"><del><strong>same
- information</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is</em></ins></span> about <span
class="inserted"><ins><em>a side issue. What</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>data is a secondary issue. The principal wrong
here</em></ins></span> is <span class="inserted"><ins><em>that
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>OS in</strong></del></span> <span
class="inserted"><ins><em>users of what it will do
+ with</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>question of
whether</strong></del></span> <span class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a
secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>, and</strong></del></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>user's actions to
Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p>
+ tracking people's locations.</p></em></ins></span>
</li>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span> data <span class="removed"><del><strong>to a
Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>it
obtains from the same machine via
- various apps. Some</em></ins></span> of <span
class="removed"><del><strong>data in</strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>phone, and</strong></del></span>
<span class="inserted"><ins><em>user's activities</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
- alter them too</a>.
- </p></li>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span> the <span
class="removed"><del><strong>ride</a>.</p>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>app;
others only say that</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>inadequate as</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- <p>This spying occurs regardless of whether the user
has</em></ins></span> a <span class="removed"><del><strong>protection against
massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
+ various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
+ the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
account.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
+<ul>
- <li><p>Apps</strong></del></span>
+ <li>
+ <p>A remote-control sex toy was found to make</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users</em></ins></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
+ track</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>phones of users that have deleted
them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what radio and TV programs</strong></del></span>
<span class="inserted"><ins><em>Android <a
+ <p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn
off the other kinds of location
- tracking, but most</em></ins></span> users <span
class="removed"><del><strong>post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>will be tricked by the misleading
control.</p></em></ins></span>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming</em></ins></span> app <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>picture you take according to who
- is in</strong></del></span> <span class="inserted"><ins><em>user's
movements and listens through</em></ins></span> the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p></em></ins></span>
-
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>makes them act as spies for licensing
enforcement.</p>
-
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>be
- sent across</strong></del></span> <span class="inserted"><ins><em>care
much less about sports, you will benefit in
+ <p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users'
pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span
class="removed"><del><strong>submit</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
- Android by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is a typical example of
- the attitude of</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the proprietary <span
class="removed"><del><strong>software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
- <li><p>Many proprietary</strong></del></span> apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>by
getting</em></ins></span> apps <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>user has
- installed.</strong></del></span> <span class="inserted"><ins><em>free
software
- only</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>at
least is visible and
- optional</a>. Not as bad as what the others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
- the user if an app contains
anti-features</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS in the
- phone.</p>
- <p>Don't</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>designed so that
users communicate such info to each
- other but not to</em></ins></span> the <span
class="inserted"><ins><em>server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass</em></ins></span> app <span
class="removed"><del><strong>developers get</strong></del></span> <span
class="inserted"><ins><em>and dis-service
- spy on users even more than</em></ins></span> users <span
class="inserted"><ins><em>expected. It <a
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
+ <li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store</em></ins></span> by
<span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span class="inserted"><ins><em>noticing WiFi
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
- <li id="M201708270"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Sarahah</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201708270">
+ <p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>zero price.</p>
+ referring to zero price.</p>
</li>
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>the app developer but</strong></del></span>
<span class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google</em></ins></span> did not
- <span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary,</em></ins></span> it
- <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and
deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+ for the snooping of these apps.</p>
- <p>On</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps, and
+ <p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>better job of preventing apps from
- cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
- to <span class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span>
to <span class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>see what they
do.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job</em></ins></span> of <span
class="inserted"><ins><em>this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -3471,7 +3479,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:53 $
+$Date: 2019/06/10 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary-surveillance.de.po 7 Jun 2019 08:33:53 -0000 1.292
+++ proprietary-surveillance.de.po 10 Jun 2019 09:02:21 -0000 1.293
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1249,6 +1249,25 @@
msgstr ""
#. type: Content of: <ul><li><p>
+msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | The DMCA and the EU Copyright Directive make it <a
# | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\">
# | illegal to study how iOS [-cr...apps-] {+cr…apps+} spy on
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.439
retrieving revision 1.440
diff -u -b -r1.439 -r1.440
--- proprietary-surveillance.fr.po 7 Jun 2019 10:26:48 -0000 1.439
+++ proprietary-surveillance.fr.po 10 Jun 2019 09:02:21 -0000 1.440
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-06-07 12:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -921,6 +922,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
"cr…apps spy on users</a>, because this would require circumventing "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary-surveillance.it-diff.html 7 Jun 2019 08:33:54 -0000
1.144
+++ proprietary-surveillance.it-diff.html 10 Jun 2019 09:02:21 -0000
1.145
@@ -634,20 +634,9 @@
disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
-
+ to <span class="removed"><del><strong>obey the user,</strong></del></span>
<span class="inserted"><ins><em>have GPS.)</p>
</li>
-
- <li><p>More than 73% of the most popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to the app's functionality,
- was</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -657,24 +646,49 @@
<ul class="blurbs">
<li id="M201906030">
- <p>Apple can</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ <p>Apple can <a
+ href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
+ track iMonsters even</em></ins></span> when <span
class="removed"><del><strong>it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>they are
suspended</a>.</p>
- <p>The article should not have described these apps as
- “free”—they</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
- track iMonsters even when they</em></ins></span> are <span
class="removed"><del><strong>not free software. The clear way to say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>suspended</a>.</p>
+ <p>This distributed bluetooth network is said to</em></ins></span>
be <span class="removed"><del><strong>almost
+ unthinkable with free software.</p>
- <p>This distributed bluetooth network</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
+ </li>
- <p>The article takes for granted that the usual analytics tools are
- legitimate,</strong></del></span> <span class="inserted"><ins><em>said to be
- “secure,”</em></ins></span> but <span
class="inserted"><ins><em>it</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers have no right to
- analyze what users are doing</strong></del></span> <span
class="inserted"><ins><em>obviously <em>not</em> secure from
- Apple</em></ins></span> or <span class="removed"><del><strong>how.
“Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>from governments</em></ins></span> that <span
class="removed"><del><strong>snoop are
- just as wrong</strong></del></span> <span class="inserted"><ins><em>can
command Apple's obedience (such</em></ins></span>
- as <span class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span class="inserted"><ins><em>the
US and China).</p></em></ins></span>
+ <li><p>More than 73% of</strong></del></span>
+ <span class="inserted"><ins><em>“secure,” but it is obviously
<em>not</em> secure from
+ Apple or from governments that can command Apple's obedience (such
+ as</em></ins></span> the <span class="removed"><del><strong>most popular
Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span
class="inserted"><ins><em>US</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p></strong></del></span> <span
class="inserted"><ins><em>China).</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>the app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these</strong></del></span>
+ <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps
<span class="removed"><del><strong>as
+ “free”—they</strong></del></span> <span
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span
class="removed"><del><strong>not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>takes for granted
that</strong></del></span> <span class="inserted"><ins><em>mentions specific
examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ and DoorDash. But it</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps
contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is</em></ins></span> no <span
class="removed"><del><strong>right to
+ analyze</strong></del></span> <span
class="inserted"><ins><em>telling</em></ins></span> what <span
class="removed"><del><strong>users are doing or how. “Analytics”
tools that snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>it will be
+ used for.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Gratis Android apps
(but not</strong></del></span>
@@ -687,27 +701,27 @@
this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span>
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add a</strong></del></span>
<span class="inserted"><ins><em><li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Some manufacturers add
a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want</em></ins></span> to <span class="removed"><del><strong>any
file on the system.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
@@ -727,10 +741,10 @@
</div>
<ul>
- <li><p>Apple proposes</strong></del></span>
+ <li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><li id="M201702150">
- <p>Apple proposes</em></ins></span> <a
+ <p>Apple</em></ins></span> proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
— which</strong></del></span> <span
class="inserted"><ins><em>screen</a>—which</em></ins></span> would
mean no way
@@ -896,41 +910,51 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904130">
<p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span> <span class="inserted"><ins><em>sometimes <a
+ on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has</em></ins></span> to <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="inserted"><ins><em>to Google.</p>
- </li>
+ saves</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location</strong></del></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
- <li id="M201812060">
- <p>Facebook's app got “consent” to <a
-
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ <p>Nonfree software in</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible for
sending</em></ins></span>
+ the <span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812060">
+ <p>Facebook's app got “consent” to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't</em></ins></span> send <span
class="removed"><del><strong>so much</strong></del></span> <span
class="inserted"><ins><em>the location</em></ins></span> data <span
class="removed"><del><strong>that their transmission is a
+ substantial expense</strong></del></span> <span
class="inserted"><ins><em>while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up the data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
- <p>Android tracks location for Google <a
+ <p>Android tracks location</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="removed"><del><strong>user, clearly must constitute
spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola</strong></del></span> phone <span
class="inserted"><ins><em>has no SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to China</a>.</p>
</li>
@@ -939,41 +963,32 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
+ <li id="M201507030">
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>kind.</p></em></ins></span>
+ transmission is a substantial expense</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>users. Said transmission,
+ not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user, clearly must constitute spying
+ of some kind.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access to any file on the
system.</p></em></ins></span>
</li>
- <li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in</em></ins></span> an article blocked from us by a paywall)
reports that <a
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308010">
+ <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
@@ -981,100 +996,126 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware is present in some Android devices when they are
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
+ the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307250">
+ <li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+<ul>
+ <li>
+ <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
+
+ <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>users is not enough</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span>
<span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ reading</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions”</em></ins></span>
that <span class="inserted"><ins><em>spell out what
they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
- hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install</strong></del></span> <span
class="inserted"><ins><em>collects</em></ins></span> on <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
+ information about the users' searches that</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must
prevent</em></ins></span> Google <span class="removed"><del><strong>normally
gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
+ and <span class="inserted"><ins><em>other companies from getting this
personal information in</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
</li>
- <li id="M201111170">
- <p>Some manufacturers add a <a
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p></strong></del></span>
+ <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of <span class="removed"><del><strong>its
phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>data to Adobe</a>. Adobe's
“excuse”: it's
+ the e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</em></ins></span> of data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1091,26 +1132,15 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
- often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes</em></ins></span> it <span class="removed"><del><strong>can
- alter them too</a>.
- </p></li>
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
+ <p>The fact that this is used</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>repression of forbidden sharing
+ makes it even more vicious.</p>
- <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software</em></ins></span>
is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
@@ -1127,48 +1157,47 @@
<ul class="blurbs">
<li id="M201905300">
<p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span>
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
- such</strong></del></span> <span class="inserted"><ins><em>users,
too,</em></ins></span> as <span class="removed"><del><strong>Facebook, Google+
and Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>you must expect from nonfree
+ <p>It snoops on users, too, as you must expect from nonfree
programs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
<span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
- the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
-
- <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can</em></ins></span> snoop on <span
class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>a lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>contact list,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p>
+ </li>
+
+ <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>has</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+ <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can
easily</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+ available</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>picture you
take according to who</strong></del></span>
+ <span class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>in the frame.</p>
+
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>“anonymized
and aggregated,” it can easily be
+ traced back</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app.</p>
<p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
and <span class="removed"><del><strong>face-recognition
@@ -1199,8 +1228,8 @@
</li>
<li id="M201903251">
- <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span> <span
class="inserted"><ins><em>huge number</em></ins></span> of
- <span class="removed"><del><strong>the attitude of the proprietary
software industry towards
+ <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude</strong></del></span> <span class="inserted"><ins><em>huge
number</em></ins></span> of <span class="removed"><del><strong>the proprietary
software industry towards
those they</strong></del></span> <span class="inserted"><ins><em><a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
@@ -1238,41 +1267,40 @@
</li>
<li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies
built</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="inserted"><ins><em>Facebook as well.</p>
+ sent personal data</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>companies built apps that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That
is</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company,</strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ <p>It shows that</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>one
can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
</li>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>perhaps by the OS
in the
- phone.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps</em></ins></span> use <span class="removed"><del><strong>by
companies.</a></p>
- <p>Don't be distracted by</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The FTC criticized this app because it asked the user to
+ approve sending</strong></del></span> <span class="inserted"><ins><em>and
+ misuse users'</em></ins></span> personal <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ Advertising ID</a></em></ins></span> to <span
class="inserted"><ins><em>other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
- users</strong></del></span> <span class="inserted"><ins><em>total) link
this ID</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>in apparent violation of
+ <p>Collecting hardware identifiers is in apparent violation of
Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
that</em></ins></span> the
@@ -1280,70 +1308,42 @@
“solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
+ app would not.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>interacting
with the app.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p></em></ins></span>
</li>
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads
on users, and redirecting</em></ins></span>
- them to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,
- the user interface of most of them was designed to make uninstallation
- difficult.</p>
+ <span class="removed"><del><strong><li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>companies, and the NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
- potentially also be used</em></ins></span> to spy <span
class="removed"><del><strong>through it too</a>.
- Here's information</strong></del></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>NSA app
spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -1352,70 +1352,101 @@
</div>
<ul>
- <li></strong></del></span>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
+ a speech recognition company based in</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them was designed to make
uninstallation
+ difficult.</p>
- <span class="inserted"><ins><em><li id="M201901050"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in</strong></del></span> the <span
class="removed"><del><strong>U.S.</p>
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should</em></ins></span> also <span
class="removed"><del><strong>contain major security vulnerabilities; crackers
+ can remotely control the toys with</strong></del></span> <span
class="inserted"><ins><em>stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way of knowing what they really do.</p>
+ </li>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>users of what it will do</em></ins></span>
- with <span class="inserted"><ins><em>the data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
- with the data is</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
- into</strong></del></span> <span class="inserted"><ins><em>secondary
issue. The principal wrong here is that</em></ins></span>
- the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ <p>Moreover,</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
+ into the toys themselves.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
+ <li>
+ <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span class="removed"><del><strong>its users
through</strong></del></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
-
- <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
- <p>Note the totally inadequate proposed response: a labeling
+ <li id="M201901050"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span class="removed"><del><strong>was
reporting</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>was surrounded by</strong></del></span> <span
class="inserted"><ins><em>will do
+ with the data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>data is</em></ins></span> a <span
class="removed"><del><strong>labeling
standard with which manufacturers would make statements about
their products, rather than free software which users could have
checked and changed.</p>
- <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here
is</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span>
+ the <span class="removed"><del><strong>vibrator
<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>same machine via
- various apps. Some</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed</em></ins></span>
information about <span class="removed"><del><strong>how
- people used it</a>.</p>
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
- <p>The company's statement</strong></del></span>
- <span class="inserted"><ins><em>the user's activities in the app; others
only say</em></ins></span> that <span class="removed"><del><strong>it was
anonymizing</strong></del></span> the <span class="removed"><del><strong>data
may be
- true,</strong></del></span> <span class="inserted"><ins><em>user is
- using that app,</em></ins></span> but <span
class="removed"><del><strong>it doesn't really matter. If it had sold the data
to a
- data broker, the data broker would have been able to figure out
- who</strong></del></span> <span class="inserted"><ins><em>that alone is
often quite informative.</p>
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
+ </li>
- <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>was.</p>
+ <li id="M201812290">
+ <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>it was
anonymizing</strong></del></span>
+ <span class="inserted"><ins><em>Facebook can correlate</em></ins></span>
the data <span class="removed"><del><strong>may be
+ true, but it doesn't really matter. If</strong></del></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>data to a
+ data broker,</strong></del></span> <span class="inserted"><ins><em>same
machine via
+ various apps. Some of them send Facebook detailed information
about</em></ins></span>
+ the <span class="removed"><del><strong>data broker would have been able to
figure out
+ who</strong></del></span> <span class="inserted"><ins><em>user's
activities in the app; others only say that</em></ins></span> the user <span
class="removed"><del><strong>was.</p>
<p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company</strong></del></span> has <span
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> has <span
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
account.</p></em></ins></span>
</li>
@@ -1462,7 +1493,16 @@
<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>save
a recording. But I can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
+ many ways. This is one more.</p>
+ </li>
+
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1472,41 +1512,22 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
- <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>one
more.</p>
- </li>
-
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection --></strong></del></span> <span class="inserted"><ins><em>its
users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>the
proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
the user if an app contains anti-features</a>.</p>
@@ -1525,7 +1546,7 @@
<li id="M201803050">
<p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ spy</em></ins></span> on <span class="removed"><del><strong>Windows
installs.</strong></del></span> <span class="inserted"><ins><em>users even more
than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
@@ -1544,7 +1565,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1956,21 +1977,17 @@
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li><p>Investigation
- Shows</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -2135,28 +2152,47 @@
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
+ really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>means nothing; the server could save that data
anyway.)</p>
+
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches,
and the switch to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
- <p>LG later said it had installed a patch to stop this, but any
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -3212,7 +3248,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary-surveillance.it.po 7 Jun 2019 08:33:54 -0000 1.305
+++ proprietary-surveillance.it.po 10 Jun 2019 09:02:21 -0000 1.306
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1228,6 +1228,25 @@
msgstr ""
#. type: Content of: <ul><li><p>
+msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | The DMCA and the EU Copyright Directive make it <a
# | href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\">
# | illegal to study how iOS [-cr...apps-] {+cr…apps+} spy on
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary-surveillance.ja-diff.html 7 Jun 2019 08:33:54 -0000
1.154
+++ proprietary-surveillance.ja-diff.html 10 Jun 2019 09:02:21 -0000
1.155
@@ -650,14 +650,30 @@
days.</p></strong></del></span> <span
class="inserted"><ins><em>US and China).</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Users
cannot</strong></del></span>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>install
even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>study how
iOS cr…apps spy on users</a>, because
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location,</em></ins></span> email <span
class="inserted"><ins><em>address, phone number or even
+ delivery</em></ins></span> address <span class="inserted"><ins><em>(in the
case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
+ <li id="M201711250">
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> the <span
class="removed"><del><strong>code</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
@@ -666,7 +682,8 @@
“turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
+ them off—only until 5am. That's</em></ins></span> Apple
+ <span class="removed"><del><strong>sends</strong></del></span> <span
class="inserted"><ins><em>for you—“We
know you want</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
@@ -759,19 +776,19 @@
<span class="inserted"><ins><em><li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or
it</em></ins></span>
+ is <span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
+ <p>The iThing</em></ins></span> also <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a</em></ins></span> feature for web sites to track
users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
@@ -835,30 +852,34 @@
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="removed"><del><strong>contact list. This malware is
designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
</li>
- <li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable</em></ins></span> phones <span
class="removed"><del><strong>come with</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201609140">
@@ -866,20 +887,17 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
+ <li id="M201507030">
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
+ that users can't delete</a>, and they send so much data
that</em></ins></span> their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
of some
@@ -907,45 +925,40 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
- the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
+ <p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
+ by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
- <li id="M201307250">
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listens for voice all the time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
<span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users,
instead</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span>
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
+ hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
- <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
@@ -975,34 +988,52 @@
<p>This example illustrates how “getting the user's
consent”
for surveillance is inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users
post</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ the e-reader used by most US libraries,</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></em></ins></span>
+ send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ needed</em></ins></span> to <span class="removed"><del><strong>who
+ is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+ <li id="M201212030">
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
- <span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>users post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1020,17 +1051,31 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> is <span
class="removed"><del><strong>nasty.</p></strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
+ makes it even more vicious.</p></em></ins></span>
+
+ <p>This <span class="removed"><del><strong>article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as</strong></del></span>
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
+ is not</em></ins></span> a <span class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This is a typical example
of</strong></del></span> <span class="inserted"><ins><em>cure
for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ those they have subjugated.</p>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
+ apps</strong></del></span> the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p>
</li>
</ul>
@@ -1041,359 +1086,478 @@
<ul class="blurbs">
<li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
+ <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> <span
class="inserted"><ins><em>secretly</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
+ optional</a>. Not as bad as what the others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
- and suggests</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as</em></ins></span> you <span
class="inserted"><ins><em>must expect from nonfree
- programs.</p>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by
the</strong></del></span> <span class="inserted"><ins><em>run a
proprietary</em></ins></span> phone <span class="removed"><del><strong>company,
and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>app</a> to</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>allowed
into</em></ins></span>
+ the <span class="inserted"><ins><em>event.</p>
+
+ <p>This</em></ins></span> app <span
class="removed"><del><strong>developers get
+ users to say “I agree”. That</strong></del></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
- the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
-
- <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user</strong></del></span> <span class="inserted"><ins><em>a
spyware that can snoop on a lot of
+ sensitive</em></ins></span> data, including <span
class="removed"><del><strong>geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span> <span class="inserted"><ins><em>user's location and
contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can
easily</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
-
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
- and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
+ available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="inserted"><ins><em>can
easily be
+ traced back</em></ins></span> to <span class="removed"><del><strong>other
companies. This shows</strong></del></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
- these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>surveillance:
why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>equal employment
+ and freedom</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software
flashlight</strong></del></span> <span class="inserted"><ins><em>make their own
pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
</li>
+</ul>
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
- spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is
available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
- a <span class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="inserted"><ins><em>being developed</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>that does more
or less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's information</strong></del></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
</li>
+</ul>
- <li id="M201903251">
- <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude</strong></del></span> <span class="inserted"><ins><em>huge
number</em></ins></span> of <span class="removed"><del><strong>the proprietary
software industry towards
- those they</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary</strong></del></span> <span
class="inserted"><ins><em>access to sensitive data without
- users' knowledge</a>. These hidden</em></ins></span> apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>may either call
home with
- the data, or pass it on to user-installed</em></ins></span> apps <span
class="inserted"><ins><em>that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which</em></ins></span> the user has
- <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps that have access to
+ the network but no direct access to the data. This
results</em></ins></span> in <span class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>massive
+ surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+ <p>A study of 24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>makes internet-controlled vibrators
<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>19</em></ins></span> of <span
class="inserted"><ins><em>them <a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive</em></ins></span> personal <span
class="removed"><del><strong>information about how
+ people use it</a>.</p>
+
+ <p>The company's statement that it anonymizes
the</strong></del></span> data <span class="removed"><del><strong>may be
+ true, but</strong></del></span> <span class="inserted"><ins><em>to
third parties</a>, which can use</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
medical condition.</p>
- <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>doing this</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span>
- <span class="inserted"><ins><em>lengthy terms of service</em></ins></span>
that <span class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>are difficult to understand. In any case,
- “consent”</em></ins></span> is <span
class="removed"><del><strong>visible and
- optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>not
sufficient to legitimize snooping.</p></em></ins></span>
+ <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="removed"><del><strong>sells the data</strong></del></span>
<span class="inserted"><ins><em>is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient</em></ins></span> to <span
class="inserted"><ins><em>legitimize snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
+ <li id="M201902230">
+ <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to Facebook</a>. Lots of companies built apps
that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="inserted"><ins><em>personal</em></ins></span>
+ data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>they collected would go to Facebook as well.</p>
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies
built</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="inserted"><ins><em>Facebook as well.</p>
+ <p>It shows that no one</em></ins></span> can <span
class="removed"><del><strong>figure out who</strong></del></span> <span
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span>
the <span class="removed"><del><strong>user is.</p>
+ </li>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company,</strong></del></span>
+ <li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control
app</a>.</p></strong></del></span>
<span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>perhaps
by</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get
- users</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201902140"></em></ins></span>
+ <p>The <span class="removed"><del><strong>app
reports</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly, whether
it</strong></del></span> <span class="inserted"><ins><em>resetting it.</p>
+
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>surrounded by a person's
+ body), and the vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>in
apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
- that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
- app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p>
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
</li>
-</ul>
-
+<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
- Here's information</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-</ul>
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people use it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the data may be
- true, but it doesn't really matter. If it sells the data to a
- data broker, the data broker can figure out who</strong></del></span>
<span class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>interface of most of them was designed to make
uninstallation
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
+ them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
- </li>
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
+ there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
+<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
- <span class="removed"><del><strong><li><p>A computerized
- vibrator</strong></del></span>
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201902010">
+ <li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
+ potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>users.
Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
+ <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect the emails of
members</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
+ this way, because</strong></del></span>
+ <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>are <em>not</em></em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201901050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="inserted"><ins><em>will do
- with the data.</p>
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>person's
- body), and</strong></del></span> <span class="inserted"><ins><em>side
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>data is</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users can check
- and change.</p>
- </li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201901050">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>.</em></ins></span> The
<span class="removed"><del><strong>Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>company</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>will do
+ with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
+ you.</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>about a side issue.
What</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>user
reads</strong></del></span> <span class="inserted"><ins><em>data is a secondary
issue. The principal wrong here is that
+ the company gets that data</em></ins></span> at <span
class="removed"><del><strong>what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
-<li><p></strong></del></span>
+<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>all.</p>
+
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and
WeatherBug,</em></ins></span> are
+ <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>tracking people's
locations.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span>
<span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span>
<span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's actions to
Facebook</a>.</p>
+ report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
+ the user's activities</em></ins></span> in the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>app; others only say that the user</em></ins></span>
is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to</strong></del></span>
+ <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
+ <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
account.</p>
</li>
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ track</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>phones
of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ record</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ the user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+ source code they cannot look at.</em></ins></span> The other
+ <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
+ in <span class="removed"><del><strong>the car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
+ their users. To protect their privacy</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
+ need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201804020">
+ <span class="inserted"><ins><em><li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+ <span class="inserted"><ins><em>other but not</em></ins></span> to <span
class="removed"><del><strong>spy on</strong></del></span> <span
class="inserted"><ins><em>the server's database.</p>
</li>
<li id="M201803050">
@@ -2046,8 +2210,7 @@
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
+ <p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
@@ -2057,14 +2220,11 @@
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>“clean”
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
+ see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>to look at
what's</em></ins></span> in <span class="removed"><del><strong>its own
malware</a>.
-</p></li></strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
+ manufacturers promise not to look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -2082,14 +2242,11 @@
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
- </li></em></ins></span>
+ </li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtWork -->
-<!-- WEBMASTERS:</strong></del></span>
-
-<span class="inserted"><ins><em><div class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareInToys">Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
@@ -2119,341 +2276,213 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
- products, rather than free software which users could have checked
+ standard with which manufacturers would make statements
about</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>products, rather than free software which
users could have checked
and changed.</p>
- <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data
to a data
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of C$4m</a> to its
- customers.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ customers.</p>
</li>
-</ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>access the
data</a> collected by the
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
- <li id="M201612060"></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest
Cam</strong></del></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and</em></ins></span> even
<span class="removed"><del><strong>when the “owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
<li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on children and adults</a>.</p></em></ins></span>
+ going to spy on children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ <p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
- accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
- even if <span class="removed"><del><strong>it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
+ recordings</em></ins></span> made <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>joke: The</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
+ the data remain on</em></ins></span> other <span
class="removed"><del><strong>day</strong></del></span> <span
class="inserted"><ins><em>servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't cancel the wrong of
+ deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>result, Amazon
has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
+ <p>A fraction of the Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+ tell</em></ins></span> you <span class="inserted"><ins><em>how and where
it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
+ break their non-disclosure agreements</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
- paying for the subscription,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really</strong></del></span>
- <span class="inserted"><ins><em>working order.</p>
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges</em></ins></span> that
<span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>would otherwise
be in
+ working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
- <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way to break the security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+ and</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <li id="M201804140">
+ <span class="inserted"><ins><em><li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
- cases mentioned</strong></del></span>
- <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p>
+ offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that snoops on its user
by
+ sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>designed <a
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+ listen to everyone</em></ins></span> in <span
class="inserted"><ins><em>the house, all the time</a>.</p>
- <li><p>Tesla cars allow the company to extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>car's location
at</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
-
- <p>Today's technological practice does not include</em></ins></span>
any <span class="removed"><del><strong>time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>way of making
- a device that can obey your voice commands without potentially spying
- on you. Even</em></ins></span> if <span class="removed"><del><strong>the
state orders</strong></del></span> it <span class="removed"><del><strong>to get
the data
- and hand</strong></del></span> <span class="inserted"><ins><em>is
air-gapped,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>could be saving up records
+ <p>Today's technological practice does not include any way of making
+ a device that can obey your voice commands without
potentially</em></ins></span> spying
+ on <span class="inserted"><ins><em>you. Even if it is air-gapped, it
could be saving up records
about you for later examination.</p>
</li>
<li id="M201407170">
<p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about</em></ins></span> the <span class="removed"><del><strong>state
can store it.</p></strong></del></span> <span
class="inserted"><ins><em>user</a>.</p></em></ins></span>
+ data about the user</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<ul>
- <li><p><a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260">
- <p><a</em></ins></span>
+ <li id="M201310260">
+ <p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy on</em></ins></span> their
<span class="removed"><del><strong>users: their</strong></del></span> <span
class="inserted"><ins><em>renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often people wear it</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p></em></ins></span>
-
- <p>This <span class="removed"><del><strong>shows that laws requiring
products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the
TV</strong></del></span> will
- <span class="removed"><del><strong>not work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report what
- the user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>teach the sheeple to find it normal that companies
+ <p>This will teach the sheeple to find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3070,7 +3099,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary-surveillance.ja.po 7 Jun 2019 08:33:54 -0000 1.278
+++ proprietary-surveillance.ja.po 10 Jun 2019 09:02:21 -0000 1.279
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1006,6 +1006,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
"cr…apps spy on users</a>, because this would require circumventing "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary-surveillance.pot 7 Jun 2019 08:33:54 -0000 1.226
+++ proprietary-surveillance.pot 10 Jun 2019 09:02:21 -0000 1.227
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -672,6 +672,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">
"
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a "
"href=\"https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html\"> "
"illegal to study how iOS cr…apps spy on users</a>, because this would "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.533
retrieving revision 1.534
diff -u -b -r1.533 -r1.534
--- proprietary-surveillance.ru.po 7 Jun 2019 09:33:33 -0000 1.533
+++ proprietary-surveillance.ru.po 10 Jun 2019 09:02:21 -0000 1.534
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -909,6 +910,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The DMCA and the EU Copyright Directive make it <a href=\"https://boingboing."
"net/2017/11/25/la-la-la-cant-hear-you.html\"> illegal to study how iOS "
"cr…apps spy on users</a>, because this would require circumventing "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.de-diff.html 7 Jun 2019 08:33:54 -0000 1.97
+++ proprietary.de-diff.html 10 Jun 2019 09:02:21 -0000 1.98
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -128,16 +128,16 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,6 +186,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -238,18 +255,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.de.po 7 Jun 2019 08:33:54 -0000 1.139
+++ proprietary.de.po 10 Jun 2019 09:02:21 -0000 1.140
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -500,22 +519,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.es.po 9 Jun 2019 10:29:05 -0000 1.172
+++ proprietary.es.po 10 Jun 2019 09:02:21 -0000 1.173
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -400,31 +420,6 @@
"La censura de aplicaciones de Apple es de por sà injusta, y serÃa también "
"injustificable aun cuando no representara una amenaza a la seguridad."
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"BlizzCon 2019 impuso el <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\">requisito de ejecutar una aplicación privativa en el teléfono</a> para "
-"poder participar en el evento."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Esta aplicación es un programa espÃa capaz de husmear en multitud de datos "
-"sensibles, incluida la localización del usuario y su lista de contactos, y "
-"que toma <a href=\"https://old.reddit.com/r/wow/comments/bkd5ew/"
-"you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">control casi "
-"total</a> del teléfono."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +499,30 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "BlizzCon 2019 impuso el <a href=\"https://arstechnica.com/gaming/2019/05/"
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\">requisito de ejecutar una aplicación privativa en el teléfono</a>
"
+#~ "para poder participar en el evento."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old."
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Esta aplicación es un programa espÃa capaz de husmear en multitud de "
+#~ "datos sensibles, incluida la localización del usuario y su lista de "
+#~ "contactos, y que toma <a href=\"https://old.reddit.com/r/wow/comments/"
+#~ "bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+#~ "\">control casi total</a> del teléfono."
+
+#~ msgid ""
#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
#~ "company made them all cease to work</a> by shutting down that server."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.fr.po 7 Jun 2019 10:26:48 -0000 1.212
+++ proprietary.fr.po 10 Jun 2019 09:02:21 -0000 1.213
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-06-07 12:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -395,31 +415,6 @@
"inexcusable même si elle n'entraînait pas, en plus, des menaces pour la "
"sécurité."
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"La BlizzCon 2019 a imposé <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\">l'utilisation d'une appli mobile privatrice</a> pour accéder à "
-"l'événement."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Cette appli est un logiciel espion qui peut récupérer une grande quantité
de "
-"données sensibles, en particulier la localisation de l'utilisateur et son "
-"carnet d'adresses, et qui a un <a href=\"https://old.reddit.com/r/wow/"
-"comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\">contrôle presque complet</a> du téléphone."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,3 +488,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "La BlizzCon 2019 a imposé <a href=\"https://arstechnica.com/"
+#~ "gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-"
+#~ "reviewed-smartphone-app/\">l'utilisation d'une appli mobile privatrice</"
+#~ "a> pour accéder à l'événement."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old."
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Cette appli est un logiciel espion qui peut récupérer une grande
quantité "
+#~ "de données sensibles, en particulier la localisation de l'utilisateur et "
+#~ "son carnet d'adresses, et qui a un <a href=\"https://old.reddit.com/r/wow/"
+#~ "comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+#~ "\">contrôle presque complet</a> du téléphone."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.it-diff.html 7 Jun 2019 08:33:54 -0000 1.109
+++ proprietary.it-diff.html 10 Jun 2019 09:02:21 -0000 1.110
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,13 +40,13 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -185,6 +185,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -237,18 +254,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.it.po 7 Jun 2019 08:33:54 -0000 1.148
+++ proprietary.it.po 10 Jun 2019 09:02:21 -0000 1.149
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -504,22 +523,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.ja-diff.html 7 Jun 2019 08:33:54 -0000 1.110
+++ proprietary.ja-diff.html 10 Jun 2019 09:02:21 -0000 1.111
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -234,18 +251,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul></em></ins></span>
@@ -306,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.ja.po 7 Jun 2019 08:33:54 -0000 1.131
+++ proprietary.ja.po 10 Jun 2019 09:02:21 -0000 1.132
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -422,22 +441,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.nl-diff.html 7 Jun 2019 08:33:54 -0000 1.109
+++ proprietary.nl-diff.html 10 Jun 2019 09:02:21 -0000 1.110
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,13 +40,13 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -185,6 +185,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -237,18 +254,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary.nl.po 7 Jun 2019 08:33:54 -0000 1.120
+++ proprietary.nl.po 10 Jun 2019 09:02:21 -0000 1.121
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -497,22 +516,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.pl-diff.html 7 Jun 2019 08:33:54 -0000 1.127
+++ proprietary.pl-diff.html 10 Jun 2019 09:02:21 -0000 1.128
@@ -127,18 +127,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -183,6 +183,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -235,18 +252,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.pl.po 7 Jun 2019 08:33:54 -0000 1.115
+++ proprietary.pl.po 10 Jun 2019 09:02:21 -0000 1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -580,22 +599,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary.pot 7 Jun 2019 08:33:54 -0000 1.112
+++ proprietary.pot 10 Jun 2019 09:02:21 -0000 1.113
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -249,6 +249,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a "
+"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">
"
+"sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a "
"href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-app/\"> track "
"iMonsters even when they are suspended</a>."
@@ -310,21 +329,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a "
-"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
-"requirement to run a proprietary phone app</a> to be allowed into the event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a "
-"href=\"https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
"
-"near-complete control</a> over the phone."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary.pt-br.po 7 Jun 2019 08:33:54 -0000 1.171
+++ proprietary.pt-br.po 10 Jun 2019 09:02:21 -0000 1.172
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-05-20 00:20-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -364,31 +383,6 @@
"A censura de aplicativos pela Apple é fundamentalmente injusta e seria "
"indesculpável, mesmo que não levasse também a ameaças de segurança."
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"A BlizzCon 2019 impôs um <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requisito de executar um aplicativo proprietário de telefone</a> para "
-"ser aceito no evento."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"Esse aplicativo é um <i lang=\"en\">spyware</i> que consegue bisbilhotar "
-"vários dados sensÃveis, incluindo a localização e a lista de contato do "
-"usuário, e tem <a href=\"https://old.reddit.com/r/wow/comments/bkd5ew/"
-"you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> controle quase "
-"completo</a> sobre seu telefone."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -464,6 +458,30 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "A BlizzCon 2019 impôs um <a
href=\"https://arstechnica.com/gaming/2019/05/"
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requisito de executar um aplicativo proprietário de telefone</a> "
+#~ "para ser aceito no evento."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old."
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "Esse aplicativo é um <i lang=\"en\">spyware</i> que consegue bisbilhotar "
+#~ "vários dados sensÃveis, incluindo a localização e a lista de contato
do "
+#~ "usuário, e tem <a href=\"https://old.reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> controle "
+#~ "quase completo</a> sobre seu telefone."
+
+#~ msgid ""
#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
#~ "company made them all cease to work</a> by shutting down that server."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary.ru.po 7 Jun 2019 09:33:33 -0000 1.248
+++ proprietary.ru.po 10 Jun 2019 09:02:21 -0000 1.249
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-06-10 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -398,31 +418,6 @@
"бÑло Ð±Ñ Ð¸Ð·Ð²Ð¸Ð½Ð¸ÑÑ, даже еÑли из-за ÑÑого не
возникали Ð±Ñ ÐµÑе и ÑгÑÐ¾Ð·Ñ "
"безопаÑноÑÑи."
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-"BlizzCon–2019 налагала <a href=\"https://arstechnica.com/"
-"gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-"
-"smartphone-app/\"> ÑÑебование ÑабоÑаÑÑ Ñ
неÑвободнÑм пÑиложением на "
-"ÑелеÑоне</a>, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿ÑопÑÑк на
меÑопÑиÑÑие."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-"ÐÑо пÑиложение — пÑогÑамма-Ñпион,
коÑоÑÐ°Ñ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² "
-"маÑÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑÑ
даннÑÑ
, в Ñом
ÑиÑле меÑÑоположение полÑзоваÑÐµÐ»Ñ Ð¸ "
-"адÑеÑнÑÑ ÐºÐ½Ð¸Ð¶ÐºÑ. Ðно Ñакже <a
href=\"https://old.reddit.com/r/wow/comments/"
-"bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\">
поÑÑи "
-"полноÑÑÑÑ ÐºÐ¾Ð½ÑÑолиÑÑеÑ</a> ÑелеÑон."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -502,6 +497,30 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
+#~ "blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-"
+#~ "app/\"> requirement to run a proprietary phone app</a> to be allowed into "
+#~ "the event."
+#~ msgstr ""
+#~ "BlizzCon–2019 налагала <a href=\"https://arstechnica.com/"
+#~ "gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-"
+#~ "reviewed-smartphone-app/\"> ÑÑебование ÑабоÑаÑÑ Ñ
неÑвободнÑм пÑиложением "
+#~ "на ÑелеÑоне</a>, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿ÑопÑÑк на
меÑопÑиÑÑие."
+
+#~ msgid ""
+#~ "This app is a spyware that can snoop on a lot of sensitive data, "
+#~ "including user's location and contact list, and has <a href=\"https://old."
+#~ "reddit.com/r/wow/comments/bkd5ew/"
+#~ "you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/\"> near-"
+#~ "complete control</a> over the phone."
+#~ msgstr ""
+#~ "ÐÑо пÑиложение — пÑогÑамма-Ñпион,
коÑоÑÐ°Ñ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² "
+#~ "маÑÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑÑ
даннÑÑ
, в Ñом
ÑиÑле меÑÑоположение полÑзоваÑÐµÐ»Ñ Ð¸ "
+#~ "адÑеÑнÑÑ ÐºÐ½Ð¸Ð¶ÐºÑ. Ðно Ñакже <a
href=\"https://old.reddit.com/r/wow/"
+#~ "comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
+#~ "\"> поÑÑи полноÑÑÑÑ ÐºÐ¾Ð½ÑÑолиÑÑеÑ</a>
ÑелеÑон."
+
+#~ msgid ""
#~ "The Jibo robot toys were tethered to the manufacturer's server, and <a "
#~ "href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
#~ "company made them all cease to work</a> by shutting down that server."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary.zh-tw-diff.html 7 Jun 2019 08:33:54 -0000 1.87
+++ proprietary.zh-tw-diff.html 10 Jun 2019 09:02:21 -0000 1.88
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -128,16 +128,16 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,6 +186,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
+ sending users' personal information to third parties</a>.</p>
+
+ <p>The article mentions specific examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
+ </li>
+
<li id="M201906030">
<p>Apple can <a
href="https://www.macrumors.com/2019/06/03/apples-new-find-my-app/">
@@ -238,18 +255,6 @@
<p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/07 08:33:54 $
+$Date: 2019/06/10 09:02:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary.zh-tw.po 7 Jun 2019 08:33:54 -0000 1.98
+++ proprietary.zh-tw.po 10 Jun 2019 09:02:22 -0000 1.99
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-06-07 08:27+0000\n"
+"POT-Creation-Date: 2019-06-10 08:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple can <a href=\"https://www.macrumors.com/2019/06/03/apples-new-find-my-"
"app/\"> track iMonsters even when they are suspended</a>."
msgstr ""
@@ -411,22 +430,6 @@
"even if it didn't lead to security threats as well."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
-"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
-"\"> requirement to run a proprietary phone app</a> to be allowed into the "
-"event."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This app is a spyware that can snoop on a lot of sensitive data, including "
-"user's location and contact list, and has <a href=\"https://old.reddit.com/r/"
-"wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"
-"\"> near-complete control</a> over the phone."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- pt-br.po 8 Jun 2019 08:31:14 -0000 1.122
+++ pt-br.po 10 Jun 2019 09:02:22 -0000 1.123
@@ -1153,6 +1153,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- ru.po 8 Jun 2019 11:02:50 -0000 1.207
+++ ru.po 10 Jun 2019 09:02:22 -0000 1.208
@@ -1488,6 +1488,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- zh-tw.po 8 Jun 2019 08:31:14 -0000 1.94
+++ zh-tw.po 10 Jun 2019 09:02:22 -0000 1.95
@@ -1111,6 +1111,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
+"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+"talking-to/\"> sending users' personal information to third parties</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
+"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
+"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
+"nonfree apps contain trackers. Some of these send personally identifying "
+"data such as phone fingerprint, exact location, email address, phone number "
+"or even delivery address (in the case of DoorDash). Once this information is "
+"collected by the company, there is no telling what it will be used for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Adware Doctor, an ad blocker for MacOS, <a href=\"https://motherboard.vice."
"com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"
"\">reports the user's browsing history</a>."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/02
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/02
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/08
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/06/18