[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sun, 21 Jul 2019 12:29:32 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/07/21 12:29:31
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.454&r2=1.455
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.548&r2=1.549
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.112&r2=1.113
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- de.po 21 Jul 2019 05:59:02 -0000 1.113
+++ de.po 21 Jul 2019 16:29:30 -0000 1.114
@@ -5656,6 +5656,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- es.po 21 Jul 2019 05:59:02 -0000 1.153
+++ es.po 21 Jul 2019 16:29:30 -0000 1.154
@@ -4779,6 +4779,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- fr.po 21 Jul 2019 06:14:54 -0000 1.196
+++ fr.po 21 Jul 2019 16:29:30 -0000 1.197
@@ -4704,6 +4704,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- it.po 21 Jul 2019 05:59:02 -0000 1.113
+++ it.po 21 Jul 2019 16:29:30 -0000 1.114
@@ -5337,6 +5337,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- ja.po 21 Jul 2019 05:59:02 -0000 1.119
+++ ja.po 21 Jul 2019 16:29:30 -0000 1.120
@@ -4079,6 +4079,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-google.de-diff.html 15 Jul 2019 10:02:20 -0000 1.29
+++ malware-google.de-diff.html 21 Jul 2019 16:29:30 -0000 1.30
@@ -322,29 +322,64 @@
<h3 id="surveillance">Google Surveillance</h3>
<span class="removed"><del><strong><ul>
- <li><p>Tracking software</strong></del></span>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+ </li>
+
+ <li><p>Android tracks location for Google</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201906220">
- <p>Google Chrome is an <a
-
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
+ when <span class="removed"><del><strong>“location services”
are turned off, even</strong></del></span> <span class="inserted"><ins><em>it
is not supposed to listen</a>. Thus,</em></ins></span> when <span
class="removed"><del><strong>the phone has no SIM
card</a>.</p></li>
+
+ <li><p>Google Chrome contains</strong></del></span> <span
class="inserted"><ins><em>one of Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>key logger</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends</strong></del></span> <span class="inserted"><ins><em>the user
wants to send to some</em></ins></span> Google <span
class="removed"><del><strong>every URL typed in</a>, one key at a
time.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201906220">
+ <p>Google</em></ins></span> Chrome <span
class="removed"><del><strong>includes a module that</strong></del></span> <span
class="inserted"><ins><em>is an</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit to advertising and
- data companies, first of all to Google. Moreover, if users have a
- Gmail account, Chrome automatically logs them</em></ins></span> in <span
class="removed"><del><strong>popular Android apps</strong></del></span> <span
class="inserted"><ins><em>to the browser for
+ users' computers</em></ins></span> and <span
class="removed"><del><strong>transmits audio to its servers</a>.</p>
+ </li>
+
+ <li><p>Spyware is present in some Android devices
when</strong></del></span> <span class="inserted"><ins><em>report the
sites</em></ins></span> they <span class="removed"><del><strong>are sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>visit</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span> <span
class="inserted"><ins><em>advertising and</em></ins></span>
+ data <span class="inserted"><ins><em>companies, first of
all</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Google. Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to the browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
- <p>The best way to escape surveillance</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>to switch to <a
+ <p>The best way to escape surveillance is to switch to <a
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones,</em></ins></span>
and sometimes <span class="removed"><del><strong>very clever. Some trackers
can</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ <p>Google tracks the movements of Android phones, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
<p>Nonfree software in the phone has to be responsible for sending
@@ -357,7 +392,7 @@
let Google monitor their phone use, and all internet use in their
homes, for an extravagant payment of $20</a>.</p>
- <p>This is not</em></ins></span> a <span
class="removed"><del><strong>user's movements around</strong></del></span>
<span class="inserted"><ins><em>malicious functionality of</em></ins></span> a
<span class="removed"><del><strong>physical store</strong></del></span> <span
class="inserted"><ins><em>program with some other
+ <p>This is not a malicious functionality of a program with some other
purpose; this is the software's sole purpose, and Google says so. But
Google says it in a way that encourages most people to ignore the
details. That, we believe, makes it fitting to list here.</p>
@@ -378,25 +413,19 @@
tracking”</a>.</p>
<p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>noticing WiFi
- networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the misleading control.</p></em></ins></span>
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
- <span
class="removed"><del><strong><li><p>Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711210">
- <p>Android</em></ins></span> tracks location for Google <a
+ <li id="M201711210">
+ <p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even when
- the phone has no SIM <span
class="removed"><del><strong>card</a>.</p></li>
-
- <li><p>Google Chrome contains a key logger
that</strong></del></span> <span
class="inserted"><ins><em>card</a>.</p>
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201704131">
- <p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
it indefinitely</a>. Parents and students complain about the lack
of transparency on the part of both the educational services and the
@@ -404,21 +433,19 @@
of proper privacy policies, among other things.</p>
<p>But complaining is not sufficient. Parents, students and teachers
- should realize that the software</em></ins></span> Google <span
class="removed"><del><strong>every URL typed in</a>, one
key</strong></del></span> <span class="inserted"><ins><em>uses to spy on
students is
+ should realize that the software Google uses to spy on students is
nonfree, so they can't verify what it really does. The only remedy is
to persuade school officials to <a
href="/education/edu-schools.html">
exclusively use free software</a> for both education and school
administration. If the school is run locally, parents and teachers
- can mandate their representatives</em></ins></span> at <span
class="inserted"><ins><em>the School Board to refuse the
- budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>time.</p></strong></del></span> <span
class="inserted"><ins><em>switch to free software. If
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
- etc.) to migrate the public schools to free
software.</p></em></ins></span>
+ etc.) to migrate the public schools to free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609210">
+ <li id="M201609210">
<p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
@@ -443,19 +470,15 @@
</li>
<li id="M201506180">
- <p>Google</em></ins></span> Chrome includes a module that <a
+ <p>Google Chrome includes a module that <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
activates microphones and transmits audio to its
servers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers</em></ins></span> send
<span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot
of</em></ins></span>
- data <span class="removed"><del><strong>to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>about the user</a>.</p>
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
</li>
<li id="M201308040">
@@ -639,7 +662,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/07/21 16:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-google.de.po 15 Jul 2019 10:02:20 -0000 1.44
+++ malware-google.de.po 21 Jul 2019 16:29:30 -0000 1.45
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -645,6 +645,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-google.es.po 18 Jul 2019 09:40:53 -0000 1.16
+++ malware-google.es.po 21 Jul 2019 16:29:30 -0000 1.17
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-17 11:45+0200\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-07-18 11:25+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -503,6 +504,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-google.fr.po 15 Jul 2019 11:32:42 -0000 1.73
+++ malware-google.fr.po 21 Jul 2019 16:29:30 -0000 1.74
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-07-15 13:32+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -505,6 +506,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-google.pot 15 Jul 2019 10:02:20 -0000 1.40
+++ malware-google.pot 21 Jul 2019 16:29:30 -0000 1.41
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -358,6 +358,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a "
+"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\">even
"
+"when it is not supposed to listen</a>. Thus, when one of Google's "
+"subcontractors discloses a thousand confidential voice recordings, users "
+"were easily identified from these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a "
"href=\"https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/\">
"
"instrument of surveillance</a>. It lets thousands of trackers invade users' "
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-google.ru.po 15 Jul 2019 11:01:09 -0000 1.93
+++ malware-google.ru.po 21 Jul 2019 16:29:30 -0000 1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2018-10-05 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -502,6 +503,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- nl.po 21 Jul 2019 05:59:02 -0000 1.113
+++ nl.po 21 Jul 2019 16:29:30 -0000 1.114
@@ -3881,6 +3881,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- pl.po 21 Jul 2019 05:59:02 -0000 1.113
+++ pl.po 21 Jul 2019 16:29:30 -0000 1.114
@@ -3334,6 +3334,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- pot 21 Jul 2019 05:59:02 -0000 1.112
+++ pot 21 Jul 2019 16:29:30 -0000 1.113
@@ -3144,6 +3144,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-surveillance.de-diff.html 15 Jul 2019 10:02:23 -0000
1.85
+++ proprietary-surveillance.de-diff.html 21 Jul 2019 16:29:30 -0000
1.86
@@ -923,117 +923,252 @@
</div>
<ul>
- <li><p>The DMCA</strong></del></span>
+ <li><p>The DMCA and the EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li><p>In</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904130">
- <p>Google tracks the movements of Android phones,</em></ins></span>
and <span class="inserted"><ins><em>sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>EU
Copyright Directive make</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>movements of Android
phones,</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
+ obvious way</strong></del></span> <span
class="inserted"><ins><em>sometimes</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>you—“We know you
want</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in the phone has</em></ins></span> to be <span
class="removed"><del><strong>spied on”.</p>
+ </li>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
</li>
- <li id="M201812060">
- <p>Facebook's app got “consent” to <a
-
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812060">
+ <p>Facebook's</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <span
class="inserted"><ins><em>got “consent” to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
what the “consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>location
data while in
airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"></em></ins></span>
- it <span class="inserted"><ins><em>saved up the data, and sent them all
later</a>.</p>
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
</li>
- <li id="M201711210">
- <p>Android tracks location for Google</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
- </li>
-
- <li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711210">
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></em></ins></span>
+ even <span class="removed"><del><strong>gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>when “location services” are turned
off, even when</em></ins></span>
+ the <span class="removed"><del><strong>code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold</em></ins></span> with <span class="removed"><del><strong>third
parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>spyware sending lots of data</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ tracks</em></ins></span> the <span class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video</strong></del></span>
<span class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+
+ <p>Even if</em></ins></span> you <span
class="removed"><del><strong>take,</strong></del></span> <span
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>keeps them up to date on all your devices.
+ Any edits</strong></del></span> <span class="inserted"><ins><em>location
tracking,</em></ins></span> you <span class="removed"><del><strong>make are
automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>must
+ disable Google Play itself to completely stop</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>tracking. This</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span>
+ <span class="inserted"><ins><em>yet another example</em></ins></span> of
<span class="removed"><del><strong>many celebrities</a>. They needed to
break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>nonfree
software pretending</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
- when it's actually doing something else. Such a thing</em></ins></span>
would <span class="inserted"><ins><em>be almost
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the <span
class="inserted"><ins><em>user,
+ when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
<li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
+ </li>
+
+ <li><p>There</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
+ transmission</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature</strong></del></span> <span
class="inserted"><ins><em>substantial expense</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span class="inserted"><ins><em>users.
Said transmission,
+ not wanted or requested</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
+ is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
</li>
- <li id="M201403120">
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> the
<span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user, clearly must constitute spying
+ of some kind.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access to any
file</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>system.</p>
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <p>Spyware</em></ins></span> in <span
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+ Journal (in</em></ins></span> an <span class="removed"><del><strong>iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>article blocked from
us by a paywall) reports that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone</em></ins></span> in
<span class="removed"><del><strong>popular</strong></del></span> Android <span
class="removed"><del><strong>apps is pervasive</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span>
+ and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <span class="inserted"><ins><em>laptops</a>.
(I suspect this means Windows laptops.) Here is</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
</li>
- <li id="M201307280">
- <p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that <a
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware is present in some Android devices</em></ins></span> when
<span class="removed"><del><strong>“location
services”</strong></del></span> <span
class="inserted"><ins><em>they</em></ins></span> are <span
class="removed"><del><strong>turned off, even</strong></del></span>
+ <span class="inserted"><ins><em>sold. Some Motorola phones,
made</em></ins></span> when <span class="removed"><del><strong>the phone has no
SIM card</a>.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span> <span
class="inserted"><ins><em>this company was owned
+ by Google, use a modified version</em></ins></span> of <span
class="inserted"><ins><em>Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ sends personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone <a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on and off, listen to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read the contact list. This malware is designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
- <p>Merely asking the “consent” of users is not enough to
+ <span class="inserted"><ins><em><li id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,
+ and they send so much data</strong></del></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>install the app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>a
+ substantial expense for users. Said transmission,</strong></del></span>
not <span class="removed"><del><strong>wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>enough to
legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ reading</em></ins></span> the <span
class="removed"><del><strong>user,</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions” that spell out what
+ they are “consenting” to. Google should</em></ins></span>
clearly <span class="removed"><del><strong>must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>and
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
+ hiding it</em></ins></span> in <span class="removed"><del><strong>Android
phones (and Windows? laptops): The Wall
+ Street Journal (in</strong></del></span> an <span
class="removed"><del><strong>article blocked</strong></del></span> <span
class="inserted"><ins><em>obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
+ and other companies</em></ins></span> from <span
class="removed"><del><strong>us by</strong></del></span> <span
class="inserted"><ins><em>getting this personal information in the
first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>paywall)
+ reports that</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
@@ -1046,54 +1181,79 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ <p>E-books</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>contain
JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p></em></ins></span>
</li>
- <li id="M201410080">
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is to restrict</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201410080">
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ send lots</em></ins></span> of data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Adobe</a>. Adobe's “excuse”:
it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
</li>
</ul>
-<div class="big-section">
+<div <span class="inserted"><ins><em>class="big-section">
<h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+<div</em></ins></span> class="big-subsection">
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201811020">
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ often a legal threat demanding a lot of money.</p></em></ins></span>
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
+ <p>The <span class="removed"><del><strong>moviepass app and
dis-service spy on users</strong></del></span> <span
class="inserted"><ins><em>fact that this is used for repression of forbidden
sharing
+ makes it</em></ins></span> even more <span
class="removed"><del><strong>than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to</strong></del></span>
<span class="inserted"><ins><em>vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ is not</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>cure for
the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1102,111 +1262,242 @@
<ul class="blurbs">
<li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ <p>Many Android</em></ins></span> apps can
+ <span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"></strong></del></span>
track <span class="removed"><del><strong>your every move</a>.</p>
+ </li>
+
+ <li><p>The Sarahah app</strong></del></span>
+ <span class="inserted"><ins><em>users' movements even when the user
says</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>allow
them access</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <span class="removed"><del><strong><li>
+ <p>Facebook's</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="removed"><del><strong>listens all the time,</strong></del></span> <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in</strong></del></span> <span
class="inserted"><ins><em>run a</em></ins></span> proprietary <span
class="removed"><del><strong>search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>phone app</a> to be allowed
into</em></ins></span>
+ the <span class="inserted"><ins><em>event.</p>
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
+ <p>This</em></ins></span> app is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>a lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="inserted"><ins><em>contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ near-complete control</a> over</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
</li>
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A</strong></del></span>
- <p>This has harmful implications for women's rights to equal
employment
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and</em></ins></span> pregnancy <span
class="removed"><del><strong>test controller application not only
+ can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span>
+ <span class="inserted"><ins><em>data is
“anonymized</em></ins></span> and <span class="removed"><del><strong>in
server accounts,</strong></del></span> <span
class="inserted"><ins><em>aggregated,”</em></ins></span> it can
+ <span class="removed"><del><strong>alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span> <span
class="inserted"><ins><em>easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>woman who
uses</em></ins></span> the <span class="removed"><del><strong>user's
consent”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+ these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
+ free-software</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>what radio
and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>Twitter.</p>
+ </li>
+
+ <li><p>Facebook's</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
+ a</em></ins></span> new <span class="removed"><del><strong>Magic Photo
app</strong></del></span> <span class="inserted"><ins><em>one is being
developed</a>.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take
according</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>sensitive
data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>data, or pass it on</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have</em></ins></span>
access to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span>
+ the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to <span class="removed"><del><strong>be
+ sent across</strong></del></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>has
absolutely no control.</p></em></ins></span>
</li>
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
-
- <li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
- </li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ <p>Whenever user “consent” is sought,</em></ins></span>
it is <span class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>buried in
+ lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>are
difficult</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>a typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize
snooping.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
+ apps the user has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the
user</a>. This is in addition to
+ the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
- <li id="M201902060">
+ <span class="inserted"><ins><em><li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
</li>
<li id="M201902041.1">
@@ -1216,7 +1507,7 @@
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ the user interface of most of them</em></ins></span> was <span
class="removed"><del><strong>found</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to make <span
class="inserted"><ins><em>uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
@@ -1227,8 +1518,8 @@
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
@@ -1268,7 +1559,7 @@
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
+ various apps. Some</em></ins></span> of <span
class="inserted"><ins><em>them send Facebook detailed information about
the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
@@ -1530,52 +1821,32 @@
and suggests you to share the picture you take according to who is
in the frame.</p>
- <p>This spyware feature seems to</em></ins></span> require <span
class="removed"><del><strong>circumventing</strong></del></span> <span
class="inserted"><ins><em>online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p>
- </li>
-
- <li><p>In</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's
servers</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the
- <span class="removed"><del><strong>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload”</em></ins></span>
them <span class="removed"><del><strong>off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
to <span class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>the
service.</p></em></ins></span>
+ even if the user didn't “upload” them to the service.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>or watching</a>. In addition,</em></ins></span>
- it <span class="removed"><del><strong>without having your fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>tell
whether the phone is snooping on
- them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In addition,
+ it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
<li id="M201604250">
- <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> data <span
class="removed"><del><strong>to Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and
in server accounts,
- it</em></ins></span> can
- <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>alter</em></ins></span> them <span
class="removed"><del><strong>from there.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="inserted"><ins><em>include <a
+ <li id="M201601130">
+ <p>Apps that include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
@@ -1584,53 +1855,37 @@
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
+ unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>server
records</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
+ found in the 500 most popular gratis Android apps</a>.</p>
- <p>The article should not have described</em></ins></span> these
<span class="removed"><del><strong>numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>apps as
- “free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
- legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
- <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
- that snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
+ that snoop are just as wrong as any other snooping.</p>
</li>
- <span
class="removed"><del><strong><li><p>Around</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and</em></ins></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, from Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
+ <li id="M201510300">
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201508210">
+ <li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all the
photos</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>some are starting
+ demanded users submit to increased snooping</a>, and some are
starting
to realize that it is nasty.</p>
<p>This article shows the <a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that</em></ins></span> they <span
class="removed"><del><strong>make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps</strong></del></span> <span class="inserted"><ins><em>present
snooping as a way to “serve”
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
@@ -1646,7 +1901,7 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of</em></ins></span> them <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>are not in fact <a
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit perfectly.</p>
@@ -1654,29 +1909,19 @@
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>100 <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From</strong></del></span> <span class="inserted"><ins><em>the
average.</p>
+ and advertising</a> URLs, on the average.</p>
</li>
<li id="M201504060">
- <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>the
user</a>. This</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>in addition to
- the snooping done</em></ins></span> by the
- <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>phone company, and perhaps by the OS in
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>whether the app developers
+ <p>Don't be distracted by the question of whether the app developers
get users to say “I agree”. That is no excuse for
malware.</p>
</li>
@@ -1684,113 +1929,57 @@
<li id="M201411260">
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
-
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
- is <span class="inserted"><ins><em>doing this in</em></ins></span> a way
<span class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not
- as bad</em></ins></span> as <span class="inserted"><ins><em>what the
others do.</p>
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p>
</li>
<li id="M201401150.1">
- <p>The Simeji keyboard is</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose</em></ins></span> is
<span class="removed"><del><strong>also a feature for web
sites</strong></del></span> to <span class="removed"><del><strong>track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS
6,</strong></del></span> <span class="inserted"><ins><em>restrict the
- use of data on the user's computer,</em></ins></span> but it
- <span class="removed"><del><strong>is still true in iOS 7.)</p>
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
</li>
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ <li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get the user's list of other people's phone
- numbers</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312060">
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</em></ins></span> for <span
class="inserted"><ins><em>use by companies</a>.</p>
-
- <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the</strong></del></span> <span
class="inserted"><ins><em>user to
- approve sending personal</em></ins></span> data <span
class="removed"><del><strong>in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>to the app
developer but did not ask
- about sending</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ numbers</a>.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> to
<span class="removed"><del><strong>exist for no
- possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
- the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
+ <li id="M201312060">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies</a>.</p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201307110">
- <p>Skype contains</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ Microsoft changed Skype <a
+
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
</ul>
@@ -1803,110 +1992,76 @@
<ul class="blurbs">
<li id="M201806240">
- <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
+ <p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it to third parties</a>.</p>
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>the massive
+ program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>snoop on all
open processes running on its user's computer</a>.</p>
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information</em></ins></span> to <span class="removed"><del><strong>turn
the phones</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</em></ins></span> on <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read the contact list. This
malware</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
-
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p>
- </li>
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
- <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
- <span class="inserted"><ins><em>a nonfree operating system.</p>
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
- <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by</strong></del></span> <span
class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot</em></ins></span> of
<span class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
- use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span> <span class="inserted"><ins><em>cost
money</em></ins></span>
- can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
</li>
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
- to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
+ <li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on
- <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to</strong></del></span> <span class="inserted"><ins><em>sniffs a
- good deal of personal data</a>, including lots of activities
which</em></ins></span>
- have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
+ spies on every process running on a gamer's computer and sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1919,97 +2074,48 @@
<ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="inserted"><ins><em>people that</em></ins></span> use <span
class="removed"><del><strong>of data on</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
+
+ <p>Don't be a sucker—reject all the stings.</p>
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
-don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
-before <span class="removed"><del><strong>and after going to a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
-
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
- </li>
-
- <li><p>The Sarahah app</strong></del></span> <span
class="inserted"><ins><em>Amazon “smart” TVs.</p>
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email
addresses</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>user's address
- book to developer's server. Note that this article
misuses</strong></del></span> the <span
class="inserted"><ins><em>own</em></ins></span> words
- <span class="removed"><del><strong>“<a
href="/philosophy/free-sw.html">free software</a>”
- referring to zero price.</p>
- </li>
-
- <li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>of</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p>
- </li>
-
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable,
according</em></ins></span> to <span class="removed"><del><strong>do lots of
surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span> <span
class="inserted"><ins><em>him,
- is that</em></ins></span> it <span class="removed"><del><strong>demands to
personal data</strong></del></span> <span class="inserted"><ins><em>is
opt-in</em></ins></span> in <span class="inserted"><ins><em>newer models. But
since</em></ins></span> the <span class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is opt-in in newer models. But since the Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some of its phones. The app</strong></del></span> <span
class="inserted"><ins><em>all future updates</em></ins></span> will <span
class="removed"><del><strong>give Verizon the same
- information about</strong></del></span> <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
- <p>If you already own a Vizio smart TV (or any smart TV,
for</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't
spying</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>you is
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest way to make sure it isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software),</em></ins></span>
and <span class="inserted"><ins><em>set up a
+ be an old computer running completely free software), and set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
@@ -2019,350 +2125,210 @@
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>article
for</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>facts it
presents. It
- is too bad that</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
- moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
- <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
- for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
- the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the</em></ins></span> surveillance.</p>
+ does not legitimize the surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511130">
- <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
- sounds to be picked up by proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>various sites
- such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+ your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
- <span class="inserted"><ins><em>across devices.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>company
- already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>private
- anymore, even if the user didn't “upload” them to the
service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>unaware
they're
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to</em></ins></span> the <span class="removed"><del><strong>conversation
between two users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
- users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p></em></ins></span>
</li>
- <li id="M201507240">
- <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
+ <span class="removed"><del><strong><li>
+ <p>The</strong></del></span>
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
+ <span class="inserted"><ins><em><li id="M201507240">
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps the user has
- installed.</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops</em></ins></span> on <span class="removed"><del><strong>a child's
speech,</strong></del></span> <span class="inserted"><ins><em>what programs
people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
record</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
- used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="removed"><del><strong>the
user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get</strong></del></span> <span
class="inserted"><ins><em>what</em></ins></span>
- users <span class="removed"><del><strong>to say “I agree”.
That is no excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
+ users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized this app
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
+ <li id="M201502090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>another company,
Nuance</a>.
- Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> it to <span
class="removed"><del><strong>other companies. This shows the
- weakness of</strong></del></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>US or some
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
+ Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>anyone? A</strong></del></span> <span
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
- software <span class="removed"><del><strong>flashlight
- app would not.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
+ <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>was surrounded</strong></del></span>
<span class="inserted"><ins><em>is done</em></ins></span> by <span
class="removed"><del><strong>a person's
+ body), as well as the vibration frequency.</p>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based</strong></del></span> in <span
class="removed"><del><strong>the U.S.</p>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than</strong></del></span> free
+ software <span class="removed"><del><strong>which users could have
+ checked and changed.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
+ <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in
on a child's speech, and even speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>third
- parties</a>.</p></em></ins></span>
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
- snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</em></ins></span> was <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
- <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
+ consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>are totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker,</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to
<span class="removed"><del><strong>figure out
+ who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
+ user <span class="removed"><del><strong>was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>watches—no
exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?</strong></del></span>
- <p>The company's statement</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="inserted"><ins><em>transmission reports a 404 error
- really means nothing; the server could save that</em></ins></span> data
<span class="removed"><del><strong>may be
- true, but</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+ reports what</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>user
watches, and</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em><a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <p>That</strong></del></span> <span class="inserted"><ins><em>switch
to turn this off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> could <span
class="removed"><del><strong>listen to these conversations
+ was unacceptable by itself.</p></li>
- <p>LG later said</em></ins></span> it had <span
class="removed"><del><strong>sold the data to</strong></del></span> <span
class="inserted"><ins><em>installed</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>figure out
- who the user was.</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
-
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
- </li>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>save that data anyway.)</p>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="inserted"><ins><em>stop this, but any
+ product could</em></ins></span> spy <span class="removed"><del><strong>on
children and adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>this way.</p>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>“Smart” Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul>
<li>
- <p>An LG “smart” watch is designed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
- long-term.</p>
-
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
-
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>someone else and</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>transmit
- conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
- </li>
-
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <p>An LG</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> “smart” <span
class="removed"><del><strong>watch is designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</strong></del></span> <span
class="inserted"><ins><em>TV</a></em></ins></span>
+ and <span class="inserted"><ins><em>use its camera</em></ins></span> to
<span class="removed"><del><strong>transmit
+ conversations too</a>.</p>
</li>
-
- <li id="M201511250"></em></ins></span>
- <p>The <span class="removed"><del><strong>article says
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam
“smart” camera</em></ins></span> is <span
class="removed"><del><strong>a back door, but that could be a
- misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches</em></ins></span> it <span
class="inserted"><ins><em>“off.”</p>
-
- <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>using it
- to outsmart you.</p></em></ins></span>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
@@ -2377,109 +2343,127 @@
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li><p></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+Note</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+
+ <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
+ at <span class="removed"><del><strong>Work</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
<div style="clear: left;"></div>
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>the code
could surely convert it
- into one.</p>
- </li>
-
- <li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
</li>
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
+ <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
+ name!</p>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
- used it</a>.</p>
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches it “off.”</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
+ Microsoft changed Skype</strong></del></span>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of
C$4m</a></em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2491,112 +2475,150 @@
<ul>
<li>
- <p>Every “home security” camera,
if</strong></del></span> its <span class="removed"><del><strong>manufacturer
can communicate</strong></del></span>
- <span class="inserted"><ins><em>customers.</p>
- </li>
+ <p>Every “home security” camera,
if</strong></del></span> its <span class="removed"><del><strong>manufacturer
can communicate with it,
+ is</strong></del></span> <span class="inserted"><ins><em>users through
the proprietary control app</a>.</p>
- <li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>it,
- is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a>
collected</em></ins></span> by the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by</em></ins></span> a
<span class="removed"><del><strong>surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p></strong></del></span>
<span class="inserted"><ins><em>person's
+ body), as well as the vibration frequency.</p>
- <p>That</em></ins></span> the <span class="removed"><del><strong>fact
- that</strong></del></span> <span class="inserted"><ins><em>manufacturer
and</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>FBI could listen
to these
- conversations was unacceptable by itself.</p>
- </li>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p></em></ins></span>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span> a <span
class="removed"><del><strong>server.</p>
+ <p>The <span class="removed"><del><strong>article describes
wrongdoing by the manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>company that made</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement</em></ins></span> that <span
class="inserted"><ins><em>it was anonymizing</em></ins></span> the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If it had sold the
data</em></ins></span> to a <span class="removed"><del><strong>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it</strong></del></span> <span
class="inserted"><ins><em>speech recognition
- company based in the U.S.</p>
+ <p>But it also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>data
+ broker,</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>data broker would
have been able to figure out who the
+ user was.</p>
- <p>Those toys</em></ins></span> also <span
class="removed"><del><strong>demonstrates that</strong></del></span> <span
class="inserted"><ins><em>contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>company
- surveillance capability.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company
+ <span class="removed"><del><strong>surveillance
capability.</p></strong></del></span> <span class="inserted"><ins><em>has
been ordered to pay a total of C$4m</a> to its
+ customers.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>The Nest Cam “smart” camera is</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</strong></del></span>
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That</em></ins></span> the manufacturer <span
class="removed"><del><strong>is using it</strong></del></span> <span
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain JavaScript code,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
+
+ <li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on children and adults</a>.</p></em></ins></span>
+ going</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>spy on
children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></strong></del></span>
+ to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
- </li></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+<ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201907210">
+ <p>Google "Assistant" records users' conversations</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
- accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ <p>That's easy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed</em></ins></span> to <span
class="removed"><del><strong>do because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>listen</a>. Thus,</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
even if <span class="removed"><del><strong>it asked for
authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
@@ -3510,7 +3532,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:23 $
+$Date: 2019/07/21 16:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary-surveillance.de.po 15 Jul 2019 10:02:24 -0000 1.300
+++ proprietary-surveillance.de.po 21 Jul 2019 16:29:30 -0000 1.301
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4101,6 +4101,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Alexa collects a lot more information from users than is necessary "
"for correct functioning (time, location, recordings made without a "
"legitimate prompt), and sends it to Amazon's servers, which store it "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.454
retrieving revision 1.455
diff -u -b -r1.454 -r1.455
--- proprietary-surveillance.fr.po 15 Jul 2019 11:32:42 -0000 1.454
+++ proprietary-surveillance.fr.po 21 Jul 2019 16:29:30 -0000 1.455
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-07-15 13:32+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3490,6 +3491,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Alexa collects a lot more information from users than is necessary "
"for correct functioning (time, location, recordings made without a "
"legitimate prompt), and sends it to Amazon's servers, which store it "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary-surveillance.it-diff.html 15 Jul 2019 10:02:25 -0000
1.152
+++ proprietary-surveillance.it-diff.html 21 Jul 2019 16:29:30 -0000
1.153
@@ -1464,7 +1464,9 @@
<p>Specifically, it can collect the emails of
members</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span>
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
@@ -2183,14 +2185,11 @@
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -2198,25 +2197,20 @@
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching
TV.</p></em></ins></span>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -2230,38 +2224,16 @@
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
manufacturers promise not to look at what's in the videos. That's not
- security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
</li>
<li id="M201603220">
@@ -2270,67 +2242,28 @@
security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250"></em></ins></span>
+ <li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches <span
class="removed"><del><strong>it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
+ even when the “owner” switches it “off.”</p>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>it
“off.”</p>
-
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
+ listening device, remote changes to the code could surely convert it
into one.</p>
</li>
@@ -2343,177 +2276,276 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
+ minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span class="inserted"><ins><em>its
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
customers.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> the <span
class="removed"><del><strong>company to extract data remotely and
- determine</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>store it.</p>
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
</ul>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
<ul>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. Guess
what?</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That</em></ins></span> the manufacturer <span
class="removed"><del><strong>is using it</strong></del></span> <span
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and</em></ins></span> even
<span class="removed"><del><strong>which page</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
<span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>spy on
children and adults</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>joke: The</strong></del></span> <span
class="inserted"><ins><em>DJI drone
- to snoop on</em></ins></span> other <span
class="removed"><del><strong>day</strong></del></span> <span
class="inserted"><ins><em>people, DJI is in many cases <a
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>snoop on
other people, DJI is in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
- <li id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201907210">
+ <p>Google "Assistant" records users' conversations</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no
authentication</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
+ when
+ <span class="removed"><del><strong>accessed through the modem. However,
even if</strong></del></span> it <span class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in the car</strong></del></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
+
+ <p>Even if</strong></del></span> <span
class="inserted"><ins><em>these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there
is</em></ins></span> no <span class="removed"><del><strong>one
connects</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
+ </li>
+
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
<span class="inserted"><ins><em>id="M201905061">
+ <p>Amazon Alexa collects a lot more</em></ins></span> information
<span class="removed"><del><strong>about drivers' movements</a>,
+ which</strong></del></span> <span class="inserted"><ins><em>from users
+ than</em></ins></span> is <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings</em></ins></span> made <span
class="removed"><del><strong>available to car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>sends
+ it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see
you</strong></del></span> <span class="inserted"><ins><em>government agencies.
In other words,
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be accessed</em></ins></span> by <span
class="removed"><del><strong>malware. The</strong></del></span>
+ <span class="inserted"><ins><em>advertising companies and government
agencies. In</em></ins></span> other
+ <span class="removed"><del><strong>cases mentioned are
done</strong></del></span> <span class="inserted"><ins><em>words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result,</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+ <p>Data collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> <span
class="inserted"><ins><em>devices such as</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span
class="removed"><del><strong>company to extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener</em></ins></span> and
<span class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made
available</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
+ at home, not only in</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>past (and,
who knows,
+ in the future too?)</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904240">
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send</strong></del></span> <span class="inserted"><ins><em>the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>data about</strong></del></span> the <span
class="removed"><del><strong>user</a>.</p>
+ </li>
+
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span>
to <span class="removed"><del><strong>spy on their renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
+ location and</em></ins></span> other <span
class="removed"><del><strong>day a woman came up to me</strong></del></span>
<span class="inserted"><ins><em>personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since the client program is nonfree,</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>data processing is
done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ tell</em></ins></span> you <span class="removed"><del><strong>on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>how and where it's done”), users have no way
+ to know what happens to</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>recordings unless human
eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
@@ -3271,7 +3303,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/21 16:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary-surveillance.it.po 15 Jul 2019 10:02:25 -0000 1.313
+++ proprietary-surveillance.it.po 21 Jul 2019 16:29:30 -0000 1.314
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3881,6 +3881,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Alexa collects a lot more information from users than is necessary "
"for correct functioning (time, location, recordings made without a "
"legitimate prompt), and sends it to Amazon's servers, which store it "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.ja-diff.html 15 Jul 2019 10:02:25 -0000
1.167
+++ proprietary-surveillance.ja-diff.html 21 Jul 2019 16:29:30 -0000
1.168
@@ -2447,6 +2447,21 @@
</div>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
@@ -3131,7 +3146,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/21 16:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary-surveillance.ja.po 15 Jul 2019 10:02:25 -0000 1.292
+++ proprietary-surveillance.ja.po 21 Jul 2019 16:29:30 -0000 1.293
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3005,6 +3005,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Alexa collects a lot more information from users than is necessary "
"for correct functioning (time, location, recordings made without a "
"legitimate prompt), and sends it to Amazon's servers, which store it "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary-surveillance.pot 15 Jul 2019 10:02:25 -0000 1.234
+++ proprietary-surveillance.pot 21 Jul 2019 16:29:30 -0000 1.235
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2370,6 +2370,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a "
+"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\">even
"
+"when it is not supposed to listen</a>. Thus, when one of Google's "
+"subcontractors discloses a thousand confidential voice recordings, users "
+"were easily identified from these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Alexa collects a lot more information from users than is necessary "
"for correct functioning (time, location, recordings made without a "
"legitimate prompt), and sends it to Amazon's servers, which store it "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.548
retrieving revision 1.549
diff -u -b -r1.548 -r1.549
--- proprietary-surveillance.ru.po 15 Jul 2019 11:01:09 -0000 1.548
+++ proprietary-surveillance.ru.po 21 Jul 2019 16:29:30 -0000 1.549
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3450,6 +3451,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Alexa collects a lot more information from users than is necessary "
"for correct functioning (time, location, recordings made without a "
"legitimate prompt), and sends it to Amazon's servers, which store it "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.de-diff.html 17 Jul 2019 10:01:41 -0000 1.107
+++ proprietary.de-diff.html 21 Jul 2019 16:29:30 -0000 1.108
@@ -186,6 +186,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201907090">
<p>Resourceful children figured out how to <a
href="https://www.bbc.co.uk/news/technology-48908766"> empty their
@@ -239,25 +254,6 @@
price,” which is a usage we should avoid. We recommend saying
“gratis” instead.</p>
</li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
- href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
-
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
- “zero price.” We recommend saying “gratis”
- instead.</p>
- </li>
</ul></em></ins></span>
@@ -318,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary.de.po 17 Jul 2019 10:01:41 -0000 1.149
+++ proprietary.de.po 21 Jul 2019 16:29:30 -0000 1.150
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -505,29 +528,6 @@
"is a usage we should avoid. We recommend saying “gratis” instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.es.po 18 Jul 2019 09:59:41 -0000 1.187
+++ proprietary.es.po 21 Jul 2019 16:29:30 -0000 1.188
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -400,41 +424,6 @@
"El artÃculo utiliza el término <cite>«free»</cite> para significar
«precio "
"cero», algo que debemos evitar. Recomendamos en su lugar decir: «gratis»."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Los desarrolladores de juegos gratuitos para móviles emplean <a href=\"/"
-"proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
-"manipulación conductual</a> para <a href=\"https://www.psychguides.com/"
-"interact/the-psychology-of-freemium/\">convertir sus productos en máquinas "
-"tragamonedas</a>. Esto se describe claramente en la infografÃa del
artÃculo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"Las ganancias generadas por estos juegos están directamente relacionadas con
"
-"el número de jugadores con una fuerte adicción (llamados «ballenas») y la
"
-"cantidad de dinero que están dispuestos a gastar. Asà los desarrolladores "
-"estudian minuciosamente el comportamiento de millones de usuarios a fin de "
-"incrementar la adictividad de sus juegos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-"Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
para "
-"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -514,6 +503,40 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Los desarrolladores de juegos gratuitos para móviles emplean <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
+#~ "manipulación conductual</a> para <a href=\"https://www.psychguides.com/"
+#~ "interact/the-psychology-of-freemium/\">convertir sus productos en "
+#~ "máquinas tragamonedas</a>. Esto se describe claramente en la infografÃa "
+#~ "del artÃculo."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called “whales”) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "Las ganancias generadas por estos juegos están directamente relacionadas "
+#~ "con el número de jugadores con una fuerte adicción (llamados
«ballenas») "
+#~ "y la cantidad de dinero que están dispuestos a gastar. Asà los "
+#~ "desarrolladores estudian minuciosamente el comportamiento de millones de "
+#~ "usuarios a fin de incrementar la adictividad de sus juegos."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses “free” to mean “zero "
+#~ "price.” We recommend saying “gratis” instead."
+#~ msgstr ""
+#~ "Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
"
+#~ "para significar «precio cero». Recomendamos en su lugar decir:
«gratis»."
+
+#~ msgid ""
#~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/"
#~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
#~ "instrument of surveillance</a>. It lets thousands of trackers invade "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.fr.po 17 Jul 2019 10:09:54 -0000 1.229
+++ proprietary.fr.po 21 Jul 2019 16:29:30 -0000 1.230
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-07-17 12:09+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -398,41 +422,6 @@
"de « gratuit », ce qui est à éviter. Nous recommandons de le remplacer
par "
"<cite>gratis</cite>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Les développeurs de jeux gratuits pour mobiles appliquent des <a href=\"/"
-"proprietary/proprietary-addictions.html#addictiveness\">techniques de "
-"manipulation comportementale</a> pour <a href=\"https://www.psychguides.com/"
-"interact/the-psychology-of-freemium/\">transformer leurs produits en "
-"machines à sous</a>. Une infographie l'explique clairement."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"Le revenu généré par ces jeux dépend directement du nombre de joueurs "
-"fortement compulsifs (on les appelle des « baleines ») et des sommes
qu'ils "
-"sont disposés à dépenser. Les développeurs étudient donc soigneusement
le "
-"comportement de millions d'utilisateurs pour augmenter le pouvoir addictif "
-"de leurs jeux."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-"Malheureusement, cet article utilise le mot <cite>free</cite> dans le sens "
-"de « gratuit ». Nous vous recommandons de dire plutôt
<cite>gratis</cite>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,3 +495,37 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Les développeurs de jeux gratuits pour mobiles appliquent des <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\">techniques de "
+#~ "manipulation comportementale</a> pour <a href=\"https://www.psychguides."
+#~ "com/interact/the-psychology-of-freemium/\">transformer leurs produits en "
+#~ "machines à sous</a>. Une infographie l'explique clairement."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called “whales”) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "Le revenu généré par ces jeux dépend directement du nombre de joueurs "
+#~ "fortement compulsifs (on les appelle des « baleines ») et des sommes "
+#~ "qu'ils sont disposés à dépenser. Les développeurs étudient donc "
+#~ "soigneusement le comportement de millions d'utilisateurs pour augmenter "
+#~ "le pouvoir addictif de leurs jeux."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses “free” to mean “zero "
+#~ "price.” We recommend saying “gratis” instead."
+#~ msgstr ""
+#~ "Malheureusement, cet article utilise le mot <cite>free</cite> dans le "
+#~ "sens de « gratuit ». Nous vous recommandons de dire plutôt
<cite>gratis</"
+#~ "cite>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.it-diff.html 17 Jul 2019 10:01:41 -0000 1.119
+++ proprietary.it-diff.html 21 Jul 2019 16:29:31 -0000 1.120
@@ -185,6 +185,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201907090">
<p>Resourceful children figured out how to <a
href="https://www.bbc.co.uk/news/technology-48908766"> empty their
@@ -238,25 +253,6 @@
price,” which is a usage we should avoid. We recommend saying
“gratis” instead.</p>
</li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
- href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
-
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
- “zero price.” We recommend saying “gratis”
- instead.</p>
- </li>
</ul></em></ins></span>
@@ -317,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.it.po 17 Jul 2019 10:01:41 -0000 1.158
+++ proprietary.it.po 21 Jul 2019 16:29:31 -0000 1.159
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -509,29 +532,6 @@
"is a usage we should avoid. We recommend saying “gratis” instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.ja-diff.html 17 Jul 2019 10:01:41 -0000 1.122
+++ proprietary.ja-diff.html 21 Jul 2019 16:29:31 -0000 1.123
@@ -182,6 +182,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201907090">
<p>Resourceful children figured out how to <a
href="https://www.bbc.co.uk/news/technology-48908766"> empty their
@@ -235,25 +250,6 @@
price,” which is a usage we should avoid. We recommend saying
“gratis” instead.</p>
</li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
- href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
-
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
- “zero price.” We recommend saying “gratis”
- instead.</p>
- </li>
</ul></em></ins></span>
@@ -314,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary.ja.po 17 Jul 2019 10:01:41 -0000 1.142
+++ proprietary.ja.po 21 Jul 2019 16:29:31 -0000 1.143
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -373,29 +396,6 @@
"is a usage we should avoid. We recommend saying “gratis” instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.nl-diff.html 17 Jul 2019 10:01:41 -0000 1.119
+++ proprietary.nl-diff.html 21 Jul 2019 16:29:31 -0000 1.120
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201907090">
<p>Resourceful children figured out how to <a
href="https://www.bbc.co.uk/news/technology-48908766"> empty their
@@ -238,25 +253,6 @@
price,” which is a usage we should avoid. We recommend saying
“gratis” instead.</p>
</li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
- href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
-
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
- “zero price.” We recommend saying “gratis”
- instead.</p>
- </li>
</ul></em></ins></span>
@@ -317,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.nl.po 17 Jul 2019 10:01:41 -0000 1.130
+++ proprietary.nl.po 21 Jul 2019 16:29:31 -0000 1.131
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -502,29 +525,6 @@
"is a usage we should avoid. We recommend saying “gratis” instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary.pl-diff.html 17 Jul 2019 10:01:41 -0000 1.137
+++ proprietary.pl-diff.html 21 Jul 2019 16:29:31 -0000 1.138
@@ -183,6 +183,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201907090">
<p>Resourceful children figured out how to <a
href="https://www.bbc.co.uk/news/technology-48908766"> empty their
@@ -236,25 +251,6 @@
price,” which is a usage we should avoid. We recommend saying
“gratis” instead.</p>
</li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
- href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
-
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
- “zero price.” We recommend saying “gratis”
- instead.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.pl.po 17 Jul 2019 10:01:41 -0000 1.125
+++ proprietary.pl.po 21 Jul 2019 16:29:31 -0000 1.126
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -585,29 +608,6 @@
"is a usage we should avoid. We recommend saying “gratis” instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.pot 17 Jul 2019 10:01:41 -0000 1.122
+++ proprietary.pot 21 Jul 2019 16:29:31 -0000 1.123
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a "
+"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\">even
"
+"when it is not supposed to listen</a>. Thus, when one of Google's "
+"subcontractors discloses a thousand confidential voice recordings, users "
+"were easily identified from these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a "
"href=\"https://www.bbc.co.uk/news/technology-48908766\"> empty their "
"parents' bank account</a> buying packs of special players for an Electronic "
@@ -318,30 +340,6 @@
"instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a "
-"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> behavioral "
-"manipulation techniques</a> to <a "
-"href=\"https://www.psychguides.com/interact/the-psychology-of-freemium/\"> "
-"turn their products into slot machines</a>. This is clearly described in an "
-"infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero "
-"price.” We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.pt-br.po 19 Jul 2019 13:29:57 -0000 1.187
+++ proprietary.pt-br.po 21 Jul 2019 16:29:31 -0000 1.188
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-07-19 09:30-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -296,6 +297,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -394,41 +418,6 @@
"O artigo usa â<i lang=\"en\">free</i>â no sentido de âpreço zeroâ,
uso este "
"que nós devemos evitar. Recomendamos dizer âgrátisâ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"Os desenvolvedores de jogos grátis para dispositivos móveis aplicam <a
href="
-"\"/proprietary/proprietary-addictions.html#addictiveness\"> técnicas de "
-"manipulação de comportamento</a> para <a
href=\"https://www.psychguides.com/"
-"interact/the-psychology-of-freemium/\"> transformar seus produtos em "
-"máquinas de caça-nÃquel</a>. Isso está claramente descrito em um
infográfico."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"O lucro gerado por esses jogos está diretamente relacionado ao número de "
-"jogadores fortemente viciados (chamados de âbaleiasâ) e à quantidade de "
-"dinheiro que eles têm a intenção de gastar. Então, os desenvolvedores "
-"estudam cuidadosamente o comportamento de milhões de usuários para aumentar
"
-"o vÃcio em seus jogos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-"Infelizmente, o artigo usa â<i lang=\"en\">free</i>â no sentido de
âpreço "
-"zeroâ. Nós recomendamos dizer âgrátisâ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +493,40 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "Os desenvolvedores de jogos grátis para dispositivos móveis aplicam <a "
+#~ "href=\"/proprietary/proprietary-addictions.html#addictiveness\"> técnicas
"
+#~ "de manipulação de comportamento</a> para <a href=\"https://www."
+#~ "psychguides.com/interact/the-psychology-of-freemium/\"> transformar seus "
+#~ "produtos em máquinas de caça-nÃquel</a>. Isso está claramente descrito
em "
+#~ "um infográfico."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called “whales”) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "O lucro gerado por esses jogos está diretamente relacionado ao número de
"
+#~ "jogadores fortemente viciados (chamados de âbaleiasâ) e à quantidade
de "
+#~ "dinheiro que eles têm a intenção de gastar. Então, os desenvolvedores "
+#~ "estudam cuidadosamente o comportamento de milhões de usuários para "
+#~ "aumentar o vÃcio em seus jogos."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses “free” to mean “zero "
+#~ "price.” We recommend saying “gratis” instead."
+#~ msgstr ""
+#~ "Infelizmente, o artigo usa â<i lang=\"en\">free</i>â no sentido de
âpreço "
+#~ "zeroâ. Nós recomendamos dizer âgrátisâ."
+
+#~ msgid ""
#~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/"
#~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
#~ "instrument of surveillance</a>. It lets thousands of trackers invade "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary.ru.po 17 Jul 2019 15:28:18 -0000 1.265
+++ proprietary.ru.po 21 Jul 2019 16:29:31 -0000 1.266
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-21 16:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -400,41 +424,6 @@
"Ð ÑÑаÑÑе Ñлово “ÑвободнÑй”
иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле нÑлевой ÑенÑ. "
"ÐÑ ÑекомендÑем вмеÑÑо ÑÑого говоÑиÑÑ
“беÑплаÑнÑй”."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-"РазÑабоÑÑики беÑплаÑнÑÑ
мобилÑнÑÑ
игÑ
пÑименÑÑÑ <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> пÑиемÑ
манипÑлÑÑии поведением</"
-"a>, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.psychguides.com/interact/the-psychology-of-"
-"freemium/\"> пÑевÑаÑиÑÑ Ñвои пÑодÑкÑÑ Ð²
авÑомаÑÑ Ð´Ð»Ñ Ð°Ð·Ð°ÑÑнÑÑ
игÑ</a>. ÐÑо "
-"наглÑдно показано на иллÑÑÑÑаÑии."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-"ÐоÑ
од, ÑоздаваемÑй ÑÑими игÑами, напÑÑмÑÑ
ÑвÑзан Ñ ÑиÑлом ÑилÑно завиÑимÑÑ
"
-"игÑоков (назÑваемÑÑ
“киÑами”) и Ñ
колиÑеÑÑвом денег, коÑоÑое они "
-"гоÑÐ¾Ð²Ñ ÑÑаÑиÑÑ. ÐÑак, ÑазÑабоÑÑики
ÑÑаÑелÑно изÑÑаÑÑ Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ðµ миллионов "
-"полÑзоваÑелей, ÑÑÐ¾Ð±Ñ Ð¸Ñ
игÑÑ Ð²ÑÑабаÑÑвали
более ÑилÑнÑÑ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-"Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² знаÑении "
-"“нÑлевой Ñенє. ÐÑ ÑекомендÑем
вмеÑÑо ÑÑого говоÑиÑÑ “"
-"беÑплаÑнÑй”."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -514,6 +503,40 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
+#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
+#~ "psychology-of-freemium/\"> turn their products into slot machines</a>. "
+#~ "This is clearly described in an infographic."
+#~ msgstr ""
+#~ "РазÑабоÑÑики беÑплаÑнÑÑ
мобилÑнÑÑ
игÑ
пÑименÑÑÑ <a href=\"/proprietary/"
+#~ "proprietary-addictions.html#addictiveness\"> пÑиемÑ
манипÑлÑÑии "
+#~ "поведением</a>, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.psychguides.com/interact/the-"
+#~ "psychology-of-freemium/\"> пÑевÑаÑиÑÑ Ñвои пÑодÑкÑÑ
в авÑомаÑÑ Ð´Ð»Ñ "
+#~ "азаÑÑнÑÑ
игÑ</a>. ÐÑо наглÑдно показано на
иллÑÑÑÑаÑии."
+
+#~ msgid ""
+#~ "The revenue generated by these games is directly related to the number of "
+#~ "strongly addicted gamers (called “whales”) and to the amount "
+#~ "of money they are willing to spend. Thus developers carefully study the "
+#~ "behavior of millions of users to increase the addictiveness of their "
+#~ "games."
+#~ msgstr ""
+#~ "ÐоÑ
од, ÑоздаваемÑй ÑÑими игÑами,
напÑÑмÑÑ ÑвÑзан Ñ ÑиÑлом ÑилÑно "
+#~ "завиÑимÑÑ
игÑоков (назÑваемÑÑ
“киÑами”) и Ñ ÐºÐ¾Ð»Ð¸ÑеÑÑвом "
+#~ "денег, коÑоÑое они гоÑÐ¾Ð²Ñ ÑÑаÑиÑÑ. ÐÑак,
ÑазÑабоÑÑики ÑÑаÑелÑно изÑÑаÑÑ "
+#~ "поведение миллионов полÑзоваÑелей,
ÑÑÐ¾Ð±Ñ Ð¸Ñ
игÑÑ Ð²ÑÑабаÑÑвали более "
+#~ "ÑилÑнÑÑ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ."
+
+#~ msgid ""
+#~ "Unfortunately, the article uses “free” to mean “zero "
+#~ "price.” We recommend saying “gratis” instead."
+#~ msgstr ""
+#~ "Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² "
+#~ "знаÑении “нÑлевой Ñенє. ÐÑ
ÑекомендÑем вмеÑÑо ÑÑого говоÑиÑÑ "
+#~ "“беÑплаÑнÑй”."
+
+#~ msgid ""
#~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/"
#~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
#~ "instrument of surveillance</a>. It lets thousands of trackers invade "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.zh-tw-diff.html 17 Jul 2019 10:01:41 -0000 1.97
+++ proprietary.zh-tw-diff.html 21 Jul 2019 16:29:31 -0000 1.98
@@ -186,6 +186,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907210">
+ <p>Google "Assistant" records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google "Assistant" uses proprietary software, there is no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
<li id="M201907090">
<p>Resourceful children figured out how to <a
href="https://www.bbc.co.uk/news/technology-48908766"> empty their
@@ -239,25 +254,6 @@
price,” which is a usage we should avoid. We recommend saying
“gratis” instead.</p>
</li>
-
- <li id="M209800000">
- <p>The developers of gratis mobile games apply <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a> to <a
- href="https://www.psychguides.com/interact/the-psychology-of-freemium/">
- turn their products into slot machines</a>. This is clearly described
- in an infographic.</p>
-
- <p>The revenue generated by these games is directly related to the
- number of strongly addicted gamers (called “whales”) and
- to the amount of money they are willing to spend. Thus developers
- carefully study the behavior of millions of users to increase the
- addictiveness of their games.</p>
-
- <p>Unfortunately, the article uses “free” to mean
- “zero price.” We recommend saying “gratis”
- instead.</p>
- </li>
</ul></em></ins></span>
@@ -318,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/17 10:01:41 $
+$Date: 2019/07/21 16:29:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.zh-tw.po 17 Jul 2019 10:01:41 -0000 1.108
+++ proprietary.zh-tw.po 21 Jul 2019 16:29:31 -0000 1.109
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-17 09:55+0000\n"
+"POT-Creation-Date: 2019-07-21 16:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Resourceful children figured out how to <a href=\"https://www.bbc.co.uk/news/"
"technology-48908766\"> empty their parents' bank account</a> buying packs of "
"special players for an Electronic Arts soccer game."
@@ -416,29 +439,6 @@
"is a usage we should avoid. We recommend saying “gratis” instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The developers of gratis mobile games apply <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> behavioral manipulation "
-"techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
-"psychology-of-freemium/\"> turn their products into slot machines</a>. This "
-"is clearly described in an infographic."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The revenue generated by these games is directly related to the number of "
-"strongly addicted gamers (called “whales”) and to the amount of "
-"money they are willing to spend. Thus developers carefully study the "
-"behavior of millions of users to increase the addictiveness of their games."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Unfortunately, the article uses “free” to mean “zero price."
-"” We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- pt-br.po 21 Jul 2019 05:59:02 -0000 1.143
+++ pt-br.po 21 Jul 2019 16:29:31 -0000 1.144
@@ -3590,6 +3590,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- ru.po 21 Jul 2019 05:59:02 -0000 1.245
+++ ru.po 21 Jul 2019 16:29:31 -0000 1.246
@@ -4667,6 +4667,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- zh-tw.po 21 Jul 2019 05:59:02 -0000 1.112
+++ zh-tw.po 21 Jul 2019 16:29:31 -0000 1.113
@@ -3264,6 +3264,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google \"Assistant\" records users' conversations <a href=\"https://"
+"arstechnica.com/information-technology/2019/07/google-defends-listening-to-"
+"ok-google-queries-after-voice-recordings-leak/\">even when it is not "
+"supposed to listen</a>. Thus, when one of Google's subcontractors discloses "
+"a thousand confidential voice recordings, users were easily identified from "
+"these recordings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since Google \"Assistant\" uses proprietary software, there is no way to see "
+"or control what it records or sends."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Rather than trying to better control the use of recordings, Google should "
+"not record or listen to the person's voice. It should only get commands "
+"that the user wants to send to some Google service."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/google-"
"chrome-has-become-surveillance-software-its-time-to-switch/\"> instrument of "
"surveillance</a>. It lets thousands of trackers invade users' computers and "