[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 30 Jul 2019 04:29:20 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/07/30 04:29:20
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po pt-br.po ru.po
zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.457&r2=1.458
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.551&r2=1.552
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.114&r2=1.115
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- de.po 21 Jul 2019 17:00:25 -0000 1.115
+++ de.po 30 Jul 2019 08:29:17 -0000 1.116
@@ -5697,9 +5697,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- es.po 22 Jul 2019 10:29:34 -0000 1.156
+++ es.po 30 Jul 2019 08:29:17 -0000 1.157
@@ -4853,10 +4853,19 @@
"para proteger la privacidad de los usuarios."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"Google rastrea los movimientos de los teléfonos Android, y a veces <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
@@ -11024,6 +11033,15 @@
"procesadores Intel incorporarán software tirano</a>."
#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google rastrea los movimientos de los teléfonos Android, y a veces <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\">guarda los datos durante años</a>."
+
+#~ msgid ""
#~ "A Motorola phone <a href=\"http://www.itproportal.com/2013/07/25/"
#~ "motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"
#~ "\"> listens for voice all the time</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- fr.po 21 Jul 2019 17:33:20 -0000 1.199
+++ fr.po 30 Jul 2019 08:29:17 -0000 1.200
@@ -4767,10 +4767,19 @@
"modifications améliorant la protection de la vie privée."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/"
"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
@@ -10672,3 +10681,12 @@
msgstr ""
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google piste les téléphones Android et <a
href=\"https://www.nytimes.com/"
+#~ "interactive/2019/04/13/us/google-location-tracking-police.html"
+#~ "\">sauvegarde les données, parfois pendant des années</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- it.po 21 Jul 2019 17:00:26 -0000 1.115
+++ it.po 30 Jul 2019 08:29:17 -0000 1.116
@@ -5378,9 +5378,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- ja.po 27 Jul 2019 16:34:30 -0000 1.122
+++ ja.po 30 Jul 2019 08:29:17 -0000 1.123
@@ -4120,9 +4120,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4296,10 +4296,9 @@
"www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-"
"always-on-future-of-android/\"> listens for voice all the time</a>."
msgstr ""
-"ã¢ããã¼ã©ã®æºå¸¯é»è©±ã¯<a
href=\"https://web.archive.org/web/20170629175629/http://"
-"www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-"
-"always-on-future-of-android/\">常"
-"æãé³å£°ãèãã¦ãã¾ã</a>ã"
+"ã¢ããã¼ã©ã®æºå¸¯é»è©±ã¯<a
href=\"https://web.archive.org/web/20170629175629/"
+"http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-"
+"the-always-on-future-of-android/\">常æãé³å£°ãèãã¦ãã¾ã</a>ã"
#. type: Content of: <ul><li><p>
msgid ""
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-google.de-diff.html 21 Jul 2019 17:00:26 -0000 1.31
+++ malware-google.de-diff.html 30 Jul 2019 08:29:17 -0000 1.32
@@ -378,7 +378,8 @@
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones, and sometimes <a
+ <p>Google tracks the movements of Android phones and iPhones
+ running Goggle apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
@@ -662,7 +663,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:26 $
+$Date: 2019/07/30 08:29:17 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-google.de.po 21 Jul 2019 17:00:27 -0000 1.46
+++ malware-google.de.po 30 Jul 2019 08:29:18 -0000 1.47
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -686,9 +686,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-google.es.po 22 Jul 2019 10:18:07 -0000 1.19
+++ malware-google.es.po 30 Jul 2019 08:29:18 -0000 1.20
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-22 12:16+0200\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2019-07-22 12:11+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -565,10 +566,19 @@
"para proteger la privacidad de los usuarios."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"Google rastrea los movimientos de los teléfonos Android, y a veces <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-google.fr.po 21 Jul 2019 17:33:20 -0000 1.76
+++ malware-google.fr.po 30 Jul 2019 08:29:18 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2019-07-21 19:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -568,10 +569,19 @@
"modifications améliorant la protection de la vie privée."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/"
"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-google.pot 21 Jul 2019 17:00:27 -0000 1.42
+++ malware-google.pot 30 Jul 2019 08:29:18 -0000 1.43
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -398,7 +398,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a "
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a "
"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
"saves the data for years</a>."
msgstr ""
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- malware-google.ru.po 21 Jul 2019 17:29:00 -0000 1.96
+++ malware-google.ru.po 30 Jul 2019 08:29:18 -0000 1.97
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2018-10-05 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -566,10 +567,19 @@
"заÑиÑÑ Ð»Ð¸Ñной жизни полÑзоваÑелей."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов на
базе Android, и иногда <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- nl.po 21 Jul 2019 17:00:27 -0000 1.115
+++ nl.po 30 Jul 2019 08:29:18 -0000 1.116
@@ -3922,9 +3922,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- pl.po 21 Jul 2019 17:00:27 -0000 1.115
+++ pl.po 30 Jul 2019 08:29:18 -0000 1.116
@@ -3375,9 +3375,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- pot 21 Jul 2019 17:00:27 -0000 1.114
+++ pot 30 Jul 2019 08:29:18 -0000 1.115
@@ -3185,9 +3185,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-surveillance.de-diff.html 21 Jul 2019 17:00:27 -0000
1.87
+++ proprietary-surveillance.de-diff.html 30 Jul 2019 08:29:18 -0000
1.88
@@ -925,334 +925,288 @@
<ul>
<li><p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
+ illegal</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201812060">
+ <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically from Android phones</a> while
disguising
+ what</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span
class="inserted"><ins><em>“consent” was
for.</p></em></ins></span>
</li>
- <li><p>In</strong></del></span>
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>movements of Android
phones,</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
- obvious way</strong></del></span> <span
class="inserted"><ins><em>sometimes</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201811230">
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>location data while in
+ airplane mode. Instead,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>you—“We know you
want</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software in the phone has</em></ins></span> to be <span
class="removed"><del><strong>spied on”.</p>
+ A more advanced way really does turn</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data, and sent</em></ins></span> them <span
class="removed"><del><strong>off—only until 5am.
+ That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>all
later</a>.</p></em></ins></span>
</li>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711210">
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
— which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>phone is snooping on
+ taken. Users would have no way to tell whether</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
when</em></ins></span>
+ the phone <span class="removed"><del><strong>is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>has no SIM card</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812060">
- <p>Facebook's</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <span
class="inserted"><ins><em>got “consent” to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ <li id="M201611150">
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>personal</strong></del></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
- <li id="M201811230">
- <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>location
data while in
- airplane mode. Instead, <a
-
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609140">
+ <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into
it</a>;</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
+ days.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a></strong></del></span> <span
class="inserted"><ins><em>users' movements</em></ins></span> without <span
class="removed"><del><strong>giving a valid email address</strong></del></span>
<span class="inserted"><ins><em>their permission</a>.</p>
- <span class="inserted"><ins><em><li id="M201711210">
- <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></em></ins></span>
- even <span class="removed"><del><strong>gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>when “location services” are turned
off, even when</em></ins></span>
- the <span class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>receiving the code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>location
tracking, you must
+ disable Google Play itself</em></ins></span> to <span
class="removed"><del><strong>it.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611150">
- <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>completely stop</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold</em></ins></span> with <span class="removed"><del><strong>third
parties.</p>
+ behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>tracking. This is
+ yet another example</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
</li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>spyware sending lots of data</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>China</a>.</p>
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p>
</li>
- <li id="M201609140">
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span class="removed"><del><strong>photos and
- videos they make.</p>
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and
+ <span class="removed"><del><strong>videos</strong></del></span> they
<span class="removed"><del><strong>make.</p>
<blockquote><p>
- iCloud Photo Library stores every photo and video</strong></del></span>
<span class="inserted"><ins><em>users' movements without their
permission</a>.</p>
-
- <p>Even if</em></ins></span> you <span
class="removed"><del><strong>take,</strong></del></span> <span
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>keeps them up to date on all your devices.
- Any edits</strong></del></span> <span class="inserted"><ins><em>location
tracking,</em></ins></span> you <span class="removed"><del><strong>make are
automatically updated everywhere. [...]
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>must
- disable Google Play itself to completely stop</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>tracking. This</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
- <span class="inserted"><ins><em>yet another example</em></ins></span> of
<span class="removed"><del><strong>many celebrities</a>. They needed to
break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>nonfree
software pretending</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>send so much data
that their
+ transmission</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
+ not wanted or requested</em></ins></span> by the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+ of <span class="removed"><del><strong>iOS</a>.</strong></del></span>
<span class="inserted"><ins><em>some kind.</p>
+ </li>
+
+ <li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p>
+ </li>
+
+ <li id="M201308010">
+ <p>Spyware in Android phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>term
“cloud”</strong></del></span> <span class="inserted"><ins><em>Wall
Street
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a>. (I suspect this</em></ins></span> means
+ <span class="removed"><del><strong>“please don't ask
where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>Windows laptops.) Here</em></ins></span> is <span
class="removed"><del><strong>a way to</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li id="M201307280">
+ <p>Spyware is present in some Android devices when they are
+ sold. Some Motorola phones, made when this company was
owned</em></ins></span>
+ by <span class="removed"><del><strong>default so it still counts
as</strong></del></span> <span class="inserted"><ins><em>Google,
use</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>modified version</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Android that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them
through</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ </li>
+
+ <li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the <span
class="inserted"><ins><em>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ <li><p>Spyware in iThings:</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="inserted"><ins><em>time</a>.</p>
</li>
- <li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
+ iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p>
</li>
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
- transmission</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature</strong></del></span> <span
class="inserted"><ins><em>substantial expense</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which is
+ <li><p>There</strong></del></span> <span
class="inserted"><ins><em>personal details of users that install the
app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>also a feature
for web sites</strong></del></span> <span class="inserted"><ins><em>not
enough</em></ins></span> to <span class="removed"><del><strong>track users,
which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span> <span class="inserted"><ins><em>users.
Said transmission,
- not wanted or requested</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
+ enabled by default</a>. (That article talks about iOS 6, but it
is still true in iOS 7.)</p>
</li>
<li><p>The iThing also
<a
href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
+ reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>can be
turned off.</p>
</li>
- <li><p>Apple can, and regularly does,
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>spell out what
+ they are “consenting” to. Google should
clearly</em></ins></span> and <span class="removed"><del><strong>regularly does,
<a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> the
<span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user, clearly must constitute spying
- of some kind.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
- <p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>system.</p>
+ remotely extract some data from iPhones for the
state</a>.</p>
</li>
- <li id="M201308010">
- <p>Spyware</em></ins></span> in <span
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
- Journal (in</em></ins></span> an <span class="removed"><del><strong>iThing,
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+ <span class="inserted"><ins><em>honestly identify</em></ins></span> the
<span class="removed"><del><strong>NSA snoop</strong></del></span> <span
class="inserted"><ins><em>information it collects</em></ins></span> on <span
class="removed"><del><strong>all the data</strong></del></span> <span
class="inserted"><ins><em>users, instead of
+ hiding it</em></ins></span> in an <span
class="removed"><del><strong>iThing,
or it is totally incompetent.</a></p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>article blocked from
us by a paywall) reports that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul>
- <li><p>Tracking software</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone</em></ins></span> in
<span class="removed"><del><strong>popular</strong></del></span> Android <span
class="removed"><del><strong>apps is pervasive</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span>
- and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <span class="inserted"><ins><em>laptops</a>.
(I suspect this means Windows laptops.) Here is</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware is present in some Android devices</em></ins></span> when
<span class="removed"><del><strong>“location
services”</strong></del></span> <span
class="inserted"><ins><em>they</em></ins></span> are <span
class="removed"><del><strong>turned off, even</strong></del></span>
- <span class="inserted"><ins><em>sold. Some Motorola phones,
made</em></ins></span> when <span class="removed"><del><strong>the phone has no
SIM card</a>.</p></li>
-
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span> <span
class="inserted"><ins><em>this company was owned
- by Google, use a modified version</em></ins></span> of <span
class="inserted"><ins><em>Android that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
- </li>
-
- <li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to turn the phones
- on and off, listen to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read the contact list. This malware is designed to
- disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,
- and they send so much data</strong></del></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>install the app</a>.</p>
-
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>a
- substantial expense for users. Said transmission,</strong></del></span>
not <span class="removed"><del><strong>wanted or
- requested by</strong></del></span> <span
class="inserted"><ins><em>enough to
- legitimize actions like this. At this point, most users have stopped
- reading</em></ins></span> the <span
class="removed"><del><strong>user,</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions” that spell out what
- they are “consenting” to. Google should</em></ins></span>
clearly <span class="removed"><del><strong>must constitute spying of some
- kind.</p></li>
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>obscurely worded EULA.</p>
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
- hiding it</em></ins></span> in <span class="removed"><del><strong>Android
phones (and Windows? laptops): The Wall
- Street Journal (in</strong></del></span> an <span
class="removed"><del><strong>article blocked</strong></del></span> <span
class="inserted"><ins><em>obscurely worded EULA.</p>
-
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies</em></ins></span> from <span
class="removed"><del><strong>us by</strong></del></span> <span
class="inserted"><ins><em>getting this personal information in the
- first place!</p>
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ and</em></ins></span> other <span class="removed"><del><strong>than
surveillance</a>. Here is</strong></del></span> <span
class="inserted"><ins><em>companies from getting this personal information
in</em></ins></span> the
+ <span class="inserted"><ins><em>first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports that</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span>
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
- <li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>contain
JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android apps is
pervasive</strong></del></span>
- <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201603080">
+ <p>E-books can contain JavaScript code,</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is to restrict</strong></del></span>
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries, <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
+ the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send</em></ins></span> lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ needed</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
+ report even</em></ins></span> which <span
class="removed"><del><strong>enable them to turn the phones
+ on and off, listen to the microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<div <span class="inserted"><ins><em>class="big-section">
+
+<div class="big-section">
<h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
-<div</em></ins></span> class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>moviepass app and
dis-service spy on users</strong></del></span> <span
class="inserted"><ins><em>fact that this is used for repression of forbidden
sharing
- makes it</em></ins></span> even more <span
class="removed"><del><strong>than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to</strong></del></span>
<span class="inserted"><ins><em>vicious.</p>
+ often a legal threat demanding a lot of money.</p>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
- </p>
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>users can't delete</a>,
+ and they send so much data</strong></del></span> <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="inserted"><ins><em>not</em></ins></span> a
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>cure for
the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span> <span class="inserted"><ins><em>nonfree
software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1262,275 +1216,288 @@
<ul class="blurbs">
<li id="M201907080">
- <p>Many Android</em></ins></span> apps can
- <span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"></strong></del></span>
track <span class="removed"><del><strong>your every move</a>.</p>
- </li>
-
- <li><p>The Sarahah app</strong></del></span>
- <span class="inserted"><ins><em>users' movements even when the user
says</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>allow
them access</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ <p>Many</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
+ Street Journal (in</strong></del></span> <span
class="inserted"><ins><em>apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves</em></ins></span> an <span
class="removed"><del><strong>article blocked from us</strong></del></span>
<span class="inserted"><ins><em>apparently unintentional weakness in Android,
+ exploited intentionally</em></ins></span> by <span
class="inserted"><ins><em>malicious apps.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Facebook's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="removed"><del><strong>listens all the time,</strong></del></span> <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <li id="M201905300">
+ <p>The Femm “fertility” app is
secretly</em></ins></span> a <span class="removed"><del><strong>paywall)
+ reports that</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p>
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>event.</p>
+
+ <p>This app is a spyware that</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS</strong></del></span>
<span class="inserted"><ins><em>snoop on a lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>contact
list,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>has</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p></em></ins></span>
</li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in</strong></del></span> <span
class="inserted"><ins><em>run a</em></ins></span> proprietary <span
class="removed"><del><strong>search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>phone app</a> to be allowed
into</em></ins></span>
- the <span class="inserted"><ins><em>event.</p>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command</strong></del></span>
- <p>This</em></ins></span> app is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="inserted"><ins><em>contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>pregnancy
monitoring apps</em></ins></span> is <span class="inserted"><ins><em>often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>use
of</strong></del></span>
+ data <span class="removed"><del><strong>on the user's computer, but it
does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>is “anonymized and
aggregated,”</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>can easily be
+ traced back</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
- <li><p>A</strong></del></span>
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and</em></ins></span> pregnancy <span
class="removed"><del><strong>test controller application not only
- can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span>
- <span class="inserted"><ins><em>data is
“anonymized</em></ins></span> and <span class="removed"><del><strong>in
server accounts,</strong></del></span> <span
class="inserted"><ins><em>aggregated,”</em></ins></span> it can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span> <span
class="inserted"><ins><em>easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+<ul>
+ <li>
+ <p>The moviepass app</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>woman who
uses</em></ins></span> the <span class="removed"><del><strong>user's
consent”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <p>This has harmful implications for women's rights to equal
employment</em></ins></span>
+ and <span class="removed"><del><strong>dis-service spy on
users</strong></del></span> <span class="inserted"><ins><em>freedom to make
their own pregnancy choices. Don't use
+ these apps,</em></ins></span> even <span class="inserted"><ins><em>if
someone offers you a reward to do so. A
+ free-software app that does</em></ins></span> more <span
class="removed"><del><strong>than users
+ expected. It</strong></del></span> <span class="inserted"><ins><em>or
less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>after going to a movie</a>.
+ </p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p>
+ <p>Don't be tracked — pay cash!</p>
</li>
- <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
- free-software</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p></em></ins></span>
</li>
- <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
- spying</em></ins></span> on <span class="removed"><del><strong>what radio
and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>Twitter.</p>
+ <span class="removed"><del><strong><li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks the movements of Android phones</em></ins></span>
and <span class="removed"><del><strong>email addresses</a> in user's
address
+ book to developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>iPhones
+ running Goggle apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the <span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
</li>
- <li><p>Facebook's</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a</em></ins></span> new <span class="removed"><del><strong>Magic Photo
app</strong></del></span> <span class="inserted"><ins><em>one is being
developed</a>.</p>
+ <li>
+ <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it
may</strong></del></span> be <span class="removed"><del><strong>analyzing
people's conversations</strong></del></span> <span
class="inserted"><ins><em>responsible for sending
+ the location data</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
</li>
- <li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take
according</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging
by</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much</strong></del></span>
<span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>sensitive
data without
+ preinstalled nonfree apps that have</em></ins></span> access <span
class="removed"><del><strong>it demands</strong></del></span> to <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>sensitive</em></ins></span> data <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>without
users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>frame.</p>
+ the <span class="removed"><del><strong>device</a>.
+ </p>
+ </li>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>data, or pass it on</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have</em></ins></span>
access to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span>
- the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to <span class="removed"><del><strong>be
- sent across</strong></del></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install</strong></del></span> on <span
class="removed"><del><strong>some of its phones. The app will give Verizon the
same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>has
absolutely no control.</p></em></ins></span>
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>have access to</em></ins></span>
+ the <span class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to the data. This
results in massive
+ surveillance</em></ins></span> on <span class="removed"><del><strong>only
one phone</a>, and</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>has absolutely no control.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
<span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
+ send sensitive personal</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
- <p>Whenever user “consent” is sought,</em></ins></span>
it is <span class="removed"><del><strong>nasty.</p>
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in the phone, and in server
accounts,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> it <span
class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span
class="inserted"><ins><em>buried in
- lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>are
difficult</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
- “consent”</em></ins></span> is <span
class="removed"><del><strong>a typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize
snooping.</p></em></ins></span>
+ <p>This example illustrates how “getting the user's
consent”</strong></del></span>
+ for <span class="removed"><del><strong>surveillance is inadequate as a
protection</strong></del></span> <span class="inserted"><ins><em>invasive
advertising or discriminating</em></ins></span> against <span
class="removed"><del><strong>massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>people in poor
+ medical condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
- apps the user has
- installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
- data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ <li><p>Apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such</strong></del></span> <span class="inserted"><ins><em>released
them, apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
<span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the
user</a>. This is in addition to
- the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users</strong></del></span> <span class="inserted"><ins><em><a
+ <p>The AppCensus database gives information on</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
- </li>
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
- <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
+ <p>Collecting hardware identifiers</em></ins></span> is in <span
class="removed"><del><strong>the frame.</p>
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ <p>This spyware feature</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ Google's policies. But it</em></ins></span> seems <span
class="inserted"><ins><em>that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>take
action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>wire to
Facebook's servers and face-recognition
+ algorithms.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
- that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
- app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>a development platform</em></ins></span> are
<span class="removed"><del><strong>private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
+ <li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
</li>
- <li id="M201902041.1">
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902041.1">
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ be</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them</em></ins></span> was <span
class="removed"><del><strong>found</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to make <span
class="inserted"><ins><em>uninstallation
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>often
malicious ads on users, and redirecting
+ them</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>phishing sites</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is a typical example</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of
+ <span class="removed"><del><strong>the attitude</strong></del></span>
<span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary</strong></del></span> <span
class="inserted"><ins><em>them was designed to make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
+ <p>Users should of course uninstall these
dangerous</em></ins></span> apps <span class="removed"><del><strong>for mobile
devices report which other</strong></del></span> <span
class="inserted"><ins><em>if they
+ haven't yet, but they should also stay away from nonfree</em></ins></span>
apps <span class="removed"><del><strong>the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span> in
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>potential risk
because
+ there</em></ins></span> is <span class="removed"><del><strong>visible and
+ optional</a>. Not as bad as</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span
class="removed"><del><strong>the others</strong></del></span> <span
class="inserted"><ins><em>they really</em></ins></span> do.</p>
</li>
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
+ gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk about “free
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
@@ -1538,39 +1505,65 @@
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>OS in</strong></del></span> <span
class="inserted"><ins><em>users of what it will do
+ with</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>question of
whether</strong></del></span> <span class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a
secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ tracking people's locations.</p></em></ins></span>
</li>
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some</em></ins></span> of <span
class="inserted"><ins><em>them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
+ Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
+ various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
+ the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ account.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy was found to make</strong></del></span>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones</em></ins></span> of <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
</li>
<li id="M201808030">
@@ -3532,7 +3525,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:27 $
+$Date: 2019/07/30 08:29:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- proprietary-surveillance.de.po 21 Jul 2019 17:00:27 -0000 1.302
+++ proprietary-surveillance.de.po 30 Jul 2019 08:29:18 -0000 1.303
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1599,19 +1599,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -2015,6 +2002,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
"apps that have access to sensitive data without users' knowledge</a>. These "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.457
retrieving revision 1.458
diff -u -b -r1.457 -r1.458
--- proprietary-surveillance.fr.po 21 Jul 2019 17:33:20 -0000 1.457
+++ proprietary-surveillance.fr.po 30 Jul 2019 08:29:18 -0000 1.458
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2019-07-21 19:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1169,24 +1170,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/"
-"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
-"les données, parfois pendant des années</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Ce doit être un logiciel non libre présent dans le téléphone qui envoie
ces "
-"données à Google."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1589,6 +1572,33 @@
"développement</a>."
#. type: Content of: <ul><li><p>
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/"
+"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
+"les données, parfois pendant des années</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+"Ce doit être un logiciel non libre présent dans le téléphone qui envoie
ces "
+"données à Google."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary-surveillance.it-diff.html 21 Jul 2019 17:00:27 -0000
1.154
+++ proprietary-surveillance.it-diff.html 30 Jul 2019 08:29:18 -0000
1.155
@@ -891,94 +891,80 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
+ <li><p>According</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen to</strong></del></span> <span class="inserted"><ins><em>sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location</strong></del></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible for
sending</em></ins></span>
- the <span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812060">
- <p>Facebook's app got “consent” to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by</strong></del></span>
+ <li id="M201812060">
+ <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what</em></ins></span> the <span class="removed"><del><strong>user,
clearly must constitute spying of some
- kind.</p></li>
-
- <li><p>A Motorola</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ what the “consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android</em></ins></span> phone <span
class="inserted"><ins><em>was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them</em></ins></span> all <span
class="inserted"><ins><em>later</a>.</p>
+ <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>location data
while in
+ airplane mode. Instead, <a
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data,</em></ins></span> and <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
when</em></ins></span>
- the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
+ even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in
Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611150">
- <p>Some portable</em></ins></span> phones <span
class="removed"><del><strong>(and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201611150">
+ <p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ tracks</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung</em></ins></span> phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ of some
+ <span class="removed"><del><strong>kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>kind.</p></em></ins></span>
</li>
- <li id="M201403120">
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a
+ <p>Spyware in Android phones (and Windows? laptops): The
Wall</em></ins></span> Street
+ Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
@@ -986,138 +972,89 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
- the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
+ <p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
+ by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other
people's</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
- <li id="M201307250">
- <p>A Motorola</em></ins></span> phone
- <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-<ul>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data
in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>device</a>.
- </p>
+ <span class="inserted"><ins><em><li id="M201307250">
+ <p>A Motorola phone <a
+
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>users that
install</em></ins></span> the <span class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>“consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>Google normally gets
when</strong></del></span> <span class="inserted"><ins><em>spell out
what</em></ins></span>
- they <span class="removed"><del><strong>use its search engine.</p>
-
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>are “consenting” to. Google should
clearly</em></ins></span> and
- <span class="inserted"><ins><em>honestly identify</em></ins></span> the
- <span class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
-
- <p>However, to truly protect people's privacy, we</em></ins></span>
must <span class="removed"><del><strong>explicitly opt-in before the app takes
effect. However,</strong></del></span> <span class="inserted"><ins><em>prevent
Google
- and other companies from getting this personal information
in</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span>
- <span class="inserted"><ins><em>first place!</p></em></ins></span>
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
+ hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
+
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201111170">
- <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201111170">
+ <p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.
+ </p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li id="M201410080">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on</strong></del></span> <span
class="inserted"><ins><em>user reads at</em></ins></span> what <span
class="removed"><del><strong>users post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1134,25 +1071,19 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take
according</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p></em></ins></span>
-
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access to some
- known-faces database, which means the pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ <p>The fact</em></ins></span> that <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
+ makes</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
+
+ <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The
app will give Verizon</strong></del></span> <span
class="inserted"><ins><em>nonfree software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for</em></ins></span> the <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
</li>
</ul>
@@ -1164,326 +1095,323 @@
<ul class="blurbs">
<li id="M201907080">
<p>Many Android apps can track</em></ins></span>
- users' <span class="removed"><del><strong>pictures are private
- anymore,</strong></del></span> <span
class="inserted"><ins><em>movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
+ users' <span class="removed"><del><strong>searches that Google normally
gets</strong></del></span> <span class="inserted"><ins><em>movements
even</em></ins></span> when
+ <span class="removed"><del><strong>they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> the <span
class="inserted"><ins><em>user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>secretly a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
+ <li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app is <span
class="inserted"><ins><em>secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too,</em></ins></span> as <span
class="inserted"><ins><em>you must expect from nonfree
- programs.</p>
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>, and the
+ user</strong></del></span> <span class="inserted"><ins><em>users, too, as
you</em></ins></span> must <span class="removed"><del><strong>explicitly opt-in
before the app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>expect from nonfree
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many</strong></del></span> proprietary <span
class="removed"><del><strong>apps for mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>phone
app</a> to be allowed into</em></ins></span>
- the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>event.</p>
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
- <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
- sensitive data, including user's location</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
- </li>
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>proprietary phone
app</a> to be allowed into
+ the event.</p>
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list,
and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p></em></ins></span>
+ <p>This app is a spyware that</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
- users to say “I agree”. That is no excuse for
malware.</p>
- </li>
+ <li id="M201904131">
+ <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+ <p>This example illustrates how
“getting</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
- <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>women's
rights</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>equal employment
- and freedom</em></ins></span> to <span class="removed"><del><strong>the
app developer but did not
- ask about sending it to other companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
- <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p>
</li>
-</ul>
+ <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
+ free-software</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
+ <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>does more or less
the same thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>various
sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>Twitter.</p>
+ </li>
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>that does more
or less the same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <li><p>Facebook's</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
+ a</em></ins></span> new <span class="removed"><del><strong>Magic Photo
app</strong></del></span> <span class="inserted"><ins><em>one is being
developed</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Goggle apps, and sometimes</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>known faces</a>,
+ and suggests you to share</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>location data</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+ </li>
+
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have</em></ins></span> access to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it
on to user-installed apps that have access</em></ins></span> to <span
class="removed"><del><strong>be
+ sent across</strong></del></span>
+ the <span class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers and face-recognition
+ algorithms.</p>
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass</em></ins></span> it <span
class="removed"><del><strong>too</a>.
- Here's information</strong></del></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>data. This results in
massive
+ surveillance on which</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>user has absolutely no
control.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ medical condition.</p>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>U.S.</p>
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
+ lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>are
difficult</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>a typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>toys with a mobile
phone.</strong></del></span> <span
class="inserted"><ins><em>data.</em></ins></span> This <span
class="removed"><del><strong>would
- enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>results</em></ins></span> in <span
class="inserted"><ins><em>massive
- surveillance</em></ins></span> on <span class="removed"><del><strong>a
child's speech, and even speak
- into</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>user has absolutely no
control.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903201"></em></ins></span>
- <p>A <span class="removed"><del><strong>computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>19</em></ins></span> of <span
class="inserted"><ins><em>them <a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive</em></ins></span> personal <span
class="removed"><del><strong>information about how
- people used it</a>.</p>
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
+ apps the user has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
- <p>The company's statement that it was anonymizing
the</strong></del></span> data <span class="removed"><del><strong>may be
- true, but</strong></del></span> <span class="inserted"><ins><em>to third
parties</a>, which can use</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="removed"><del><strong>had sold the data</strong></del></span>
<span class="inserted"><ins><em>is buried in
- lengthy terms of service that are difficult</em></ins></span> to <span
class="inserted"><ins><em>understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
- <li id="M201902230">
- <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to Facebook</a>. Lots of companies built apps
that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="inserted"><ins><em>personal</em></ins></span>
- data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>they collected</em></ins></span> would <span
class="removed"><del><strong>have been able to figure out
- who the user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even the
- developers</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by
the OS in the
+ phone.</p>
- <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+ 18,000 (23%</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>total) link</em></ins></span> this <span
class="removed"><del><strong>app because it asked the user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
<span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
+ <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span class="inserted"><ins><em>malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
- them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
+ pushing unwanted and often malicious ads on users, and redirecting
+ them</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
+ a speech recognition company based in</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in <span
class="removed"><del><strong>on</strong></del></span>
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>child's
speech, and even speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
- source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator
+ <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>The app was reporting the temperature</strong></del></span>
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>users.
Other technical flaws were
- found as well.</p>
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>usersâ
privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive
advertising—that</em></ins></span> could <span
class="removed"><del><strong>have
+ checked and changed.</p>
- <p>Specifically, it can collect the emails of
members</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because they pass it through Microsoft.</p></li>
+ <p>The company</strong></del></span>
+ <span class="inserted"><ins><em>potentially also be used to spy on users.
Other technical flaws were
+ found as well.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
+ <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk about “free
+ <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>how
+ people used it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <li id="M201901050">
- <p>The Weather Channel app <a
+ <li id="M201901050"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ stored users' locations to the</em></ins></span> company's <span
class="removed"><del><strong>statement</strong></del></span> <span
class="inserted"><ins><em>server</a>. The company is
+ being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>was anonymizing</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>will do
+ with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>data broker would have been able to figure out
+ who</strong></del></span> <span class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>user
was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>data is a secondary issue. The principal wrong
here is that</em></ins></span>
+ the company <span class="removed"><del><strong>has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>gets that data at
all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1492,9 +1420,9 @@
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps <a
+ <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
@@ -1503,33 +1431,42 @@
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>phones of users
that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
+ tracking, but most users will be tricked</em></ins></span> by the <span
class="removed"><del><strong>manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
<p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>save
a recording. But I can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
@@ -1537,11 +1474,23 @@
</li>
<li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear:</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -2008,9 +1957,9 @@
<h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear:</em></ins></span> left;"></div>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -2250,50 +2199,80 @@
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it
into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data
to a data
broker, the data broker would have been able to figure out who the
user was.</p>
@@ -3303,7 +3282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:27 $
+$Date: 2019/07/30 08:29:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary-surveillance.it.po 21 Jul 2019 17:00:28 -0000 1.315
+++ proprietary-surveillance.it.po 30 Jul 2019 08:29:18 -0000 1.316
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1547,19 +1547,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1958,6 +1945,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
"apps that have access to sensitive data without users' knowledge</a>. These "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary-surveillance.ja-diff.html 27 Jul 2019 16:58:47 -0000
1.170
+++ proprietary-surveillance.ja-diff.html 30 Jul 2019 08:29:18 -0000
1.171
@@ -824,55 +824,45 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
+ <li><p>According</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones,</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span> <span class="inserted"><ins><em>sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone has</em></ins></span> to <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="inserted"><ins><em>to Google.</p>
- </li>
-
<li id="M201812060">
- <p>Facebook's app got “consent” to <a
-
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>location data
while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up the data,</em></ins></span> and <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
+ the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ tracks</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
<p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
@@ -978,44 +968,35 @@
<p>This example illustrates how “getting the user's
consent”
for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li><p>Apps that include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></em></ins></span>
</li>
- <li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
- <p>This spyware feature seems to require online access to some
- known-faces database,</strong></del></span> <span
class="inserted"><ins><em>Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even</em></ins></span> which <span
class="removed"><del><strong>means</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
+ <span class="inserted"><ins><em><li id="M201212030">
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -1032,16 +1013,20 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="removed"><del><strong>be
- sent across</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take
according</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
+ makes it even more vicious.</p></em></ins></span>
- <p>This illustrates that making unauthorized copies of nonfree
software
+ <p>This <span class="removed"><del><strong>spyware feature seems to
require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
is not a cure for</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
algorithms.</p>
@@ -1083,17 +1068,16 @@
<li id="M201905060">
<p>BlizzCon 2019 imposed a</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
+ demanded users submit to increased snooping</a>, and some
+ are starting</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>run a
proprietary phone app</a></em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+ requirement</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>be allowed into</em></ins></span>
- the <span class="removed"><del><strong><a
+ <p>This article shows the <a
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>event.</p>
+ twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a></em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>be allowed into
+ the event.</p>
<p>This app</em></ins></span> is a <span
class="removed"><del><strong>typical example of
the attitude</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
@@ -1108,64 +1092,75 @@
<span class="inserted"><ins><em><li id="M201904131">
<p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user
has
- installed.</strong></del></span> <span class="inserted"><ins><em>is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
is <span class="removed"><del><strong>doing this in a way that at
least</strong></del></span> <span class="inserted"><ins><em>often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
available to employers and insurance companies</a>. Even though the
- data</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span> <span class="inserted"><ins><em>“anonymized and
aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
+ data</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>“anonymized</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>aggregated,”
it can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
- <p>This has harmful implications for women's rights to equal
employment
+ <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>women's rights
to equal employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
- spying on you</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <li><p>Widely used</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>.
This</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
+ a new one</em></ins></span> is <span class="removed"><del><strong>in
addition to
+ the snooping done by</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <li id="M201904130">
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones</em></ins></span> and
<span class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>iPhones
+ running Goggle apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree</em></ins></span> apps <span
class="removed"><del><strong>snoop on the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>that have
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data
without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>snooping done
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to
user-installed apps that have access to</em></ins></span>
- the <span class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>network but no direct
access to</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data. This results</em></ins></span> in <span
class="inserted"><ins><em>massive
- surveillance on which</em></ins></span> the
+ <p>Nonfree software</em></ins></span> in the
<span class="removed"><del><strong>phone.</p>
- <p>Don't be distracted by the question of whether the app
developers get
- users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>control.</p></em></ins></span>
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>phone has to</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>responsible for
sending</em></ins></span>
+ the <span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Google.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <p>The FTC criticized this app because it asked the user to
- approve sending</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
+
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
+ the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive</em></ins></span> personal data to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it <span class="removed"><del><strong>to other companies.
This shows the
- weakness</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ <li id="M201903201">
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
+ send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send</strong></del></span> <span
class="inserted"><ins><em>understand. In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
+ lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
“consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
</li>
@@ -1237,14 +1232,14 @@
<p>The app reports the temperature</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly, whether
it</strong></del></span> <span class="inserted"><ins><em>resetting it.</p>
-
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>surrounded by a person's
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it is surrounded</strong></del></span>
<span class="inserted"><ins><em>total) link this ID to hardware
identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>a person's
body), and the vibration frequency.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in
apparent violation of
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
@@ -1496,24 +1491,25 @@
though.</p>
</li>
- <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <li><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one more.</p>
+ <p>If you learn to care much less</em></ins></span> about <span
class="removed"><del><strong>drivers' movements</a>,
+ which</strong></del></span> <span class="inserted"><ins><em>sports, you
will benefit in
+ many ways. This</em></ins></span> is <span
class="removed"><del><strong>made available</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection
systems, mentioned in this article, is not
+ really a matter</strong></del></span> <span
class="inserted"><ins><em>the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary
<span class="removed"><del><strong>surveillance. These systems are an
intolerable invasion of privacy, and should be replaced with anonymous
payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at.</em></ins></span> The other
@@ -1581,10 +1577,10 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>physical store by
noticing WiFi
+ follow</em></ins></span> a <span class="removed"><del><strong>woman came
up</strong></del></span> <span class="inserted"><ins><em>user's movements
around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -1613,180 +1609,101 @@
before Amazon “smart” TVs.</p>
<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on</strong></del></span> <span class="inserted"><ins><em>hand, Google
redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice
of</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
-
- <p>The report was</strong></del></span> <span
class="inserted"><ins><em>being
- nonfree. It also distributes its own nonfree apps, such</em></ins></span>
as <span class="inserted"><ins><em>Google Play,
+ <li><p>More</strong></del></span> <span
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>preventing apps from
- cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
- to <span class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>inspect
executable proprietary apps to see</em></ins></span> what <span
class="removed"><del><strong>happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
- the source code somehow</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs</strong></del></span> <span
class="inserted"><ins><em>app developers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>clever
- enough</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs</strong></del></span>
+ <span class="inserted"><ins><em>prevent such snooping, except when the app
developers are clever
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p></em></ins></span>
+ public, so we can depend on each other.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
+ <li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+ snoop</em></ins></span> on <span
class="removed"><del><strong>their</strong></del></span>
users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>they
- don't snoop.</p>
+ <span class="removed"><del><strong><p>The
report</strong></del></span>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>track you
- across devices.</p>
+ <span class="inserted"><ins><em><p>With free software apps, users
could <em>make sure</em> that they
+ don't snoop.</p>
- <p>It is possible to turn this off, but having it enabled by
default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being
watched</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users</em></ins></span>
by
- <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
- social media participation, Tivo can now</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to
- <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound
from beacons placed in stores or played</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
- <li><p>Some web and</strong></del></span> TV <span
class="removed"><del><strong>advertisements play inaudible
sounds</strong></del></span>
- <span class="inserted"><ins><em>programs</a>.</p>
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>do lots
of surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</em></ins></span> it <span
class="removed"><del><strong>isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span> <span
class="inserted"><ins><em>demands to personal data in</em></ins></span> the
<span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>device</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
- the <span class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance can save it and</strong></del></span>
<span class="inserted"><ins><em>app</em></ins></span> would <span
class="removed"><del><strong>then have to
- give it to</strong></del></span> <span
class="inserted"><ins><em>record</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in your own computer.</p>
- </li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span>
- <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>switch to turn this off has no effect. (The
fact</strong></del></span> <span class="inserted"><ins><em>headphone's unique
serial number.</p>
-
- <p>The suit accuses</em></ins></span> that <span
class="inserted"><ins><em>this was done without</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>users' consent.
- If</em></ins></span> the <span class="removed"><del><strong>server
- could save</strong></del></span> <span class="inserted"><ins><em>fine
print of the app said</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
-
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>users gave consent for this,
- would that make</em></ins></span> it <span
class="inserted"><ins><em>acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
- the <span class="removed"><del><strong>user's local
network.</a></p>
-
- <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>stop this, but any product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.</p>
+ </li>
+
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
</li>
<li id="M201704074">
<p>Pairs of Android apps can collude
- to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens</em></ins></span> of <span
class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>thousands of pairs that
collude</a>.</p></em></ins></span>
+ to transmit users' personal data to servers. <a
+
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <span class="inserted"><ins><em><li id="M201703300">
+ <li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install</em></ins></span>
- on <span class="removed"><del><strong>what programs people watch, and even
what</strong></del></span> <span class="inserted"><ins><em>some of its phones.
The app will give Verizon the same information
- about the users' searches that Google normally gets when</em></ins></span>
they <span class="removed"><del><strong>wanted to record.</a></p>
- </li>
-</ul>
-
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>use
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>report to</strong></del></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of
spyware</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
- a nonfree operating system.</p></strong></del></span>
- <span class="inserted"><ins><em>still spyware.</p></em></ins></span>
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</em></ins></span> data <span class="removed"><del><strong>about their
users</strong></del></span> <span class="inserted"><ins><em>to a Chinese
company</a>.</p>
+ <li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>after the ride</a>.</p>
+ movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
@@ -2522,44 +2439,69 @@
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <li id="M201804140">
+ <span class="inserted"><ins><em><li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
+ offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products are designed <a
+ <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
+ link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
data about the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
@@ -2575,8 +2517,10 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of what they do.</p>
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
+ monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
@@ -2585,16 +2529,18 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
too</a>.</p>
@@ -2609,31 +2555,36 @@
<ul class="blurbs">
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and <a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p>
- </li>
-
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span
class="inserted"><ins><em>junkyard the driver's personal data goes with
+ them</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
- including car location. This feature operates even when the ignition
+ connected to the cellular phone network</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ including car location. This feature operates even when</em></ins></span>
the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>ignition
key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
- antenna in aluminum foil?</p>
+ antenna in aluminum foil?</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201811300">
+ <span class="inserted"><ins><em><li id="M201811300">
<p>In China, it is mandatory for electric
- cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
+ cars to be equipped with a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,</em></ins></span>
+ to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In practice,
<a
href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
@@ -2645,29 +2596,33 @@
tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get</em></ins></span> users'
- <span class="removed"><del><strong>friends</strong></del></span> <span
class="inserted"><ins><em>consent, but it could have got that easily by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
+ phones. <em>All</em> such data collection
should</em></ins></span> be <span class="removed"><del><strong>trusted unless
it</strong></del></span> <span class="inserted"><ins><em>forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that data.</p>
+ hardware cannot collect any of that data, or that the
software</em></ins></span>
+ is <span class="removed"><del><strong>done
+ by</strong></del></span> free <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't
collect any of that data.</p>
</li>
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <span class="inserted"><ins><em><li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
@@ -2675,43 +2630,81 @@
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ access its computers remotely</em></ins></span> and
+ <span class="removed"><del><strong>the switch</strong></del></span>
<span class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy to</em></ins></span> do <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>because the system has no authentication
- when accessed</em></ins></span> through <span
class="removed"><del><strong>ad networks</strong></del></span> <span
class="inserted"><ins><em>the modem. However, even if it asked
- for authentication, you couldn't be confident</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>turn this off</strong></del></span> <span
class="inserted"><ins><em>do because the system</em></ins></span> has no <span
class="removed"><del><strong>effect. (The fact that the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if</em></ins></span> it
+ <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said it had installed a patch to stop this, but any
product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p>
+ </li>
+</ul>
+
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone modem
+ <p>Even if no one connects</em></ins></span> to the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
+
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
enables the phone company to track the car's movements all the time;
- it is possible to physically remove the cell phone modem, though.</p>
+ it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
- <li id="M201306140">
- <p>Tesla cars allow</em></ins></span> the <span
class="inserted"><ins><em>company to extract</em></ins></span>
- data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>sites made by different
- companies.</p>
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of</strong></del></span>
- <p>They use</strong></del></span> <span
class="inserted"><ins><em>determine the car's location
- at any time. (See Section 2, paragraphs b and c of the <a
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow the company to extract</em></ins></span>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>data to
manipulate people</strong></del></span>
- <span class="inserted"><ins><em>information, but if the state orders
it</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>get the
data</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>store it.</p>
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p>
</li>
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
- available</em></ins></span> to <span class="removed"><del><strong>spend a
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers,
insurance companies, and others.</p>
+ records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ companies.</p>
+
+ <p>They use this data to manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
<p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -3146,7 +3139,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/27 16:58:47 $
+$Date: 2019/07/30 08:29:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary-surveillance.ja.po 27 Jul 2019 16:58:47 -0000 1.296
+++ proprietary-surveillance.ja.po 30 Jul 2019 08:29:18 -0000 1.297
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1149,19 +1149,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1485,6 +1472,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
"apps that have access to sensitive data without users' knowledge</a>. These "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary-surveillance.pot 21 Jul 2019 17:00:28 -0000 1.236
+++ proprietary-surveillance.pot 30 Jul 2019 08:29:18 -0000 1.237
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -833,19 +833,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a "
-"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
-"saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Facebook's app got “consent” to <a "
"href=\"https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent\">
"
"upload call logs automatically from Android phones</a> while disguising what "
@@ -1109,6 +1096,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android phones come with a huge number of <a "
"href=\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\">
"
"preinstalled nonfree apps that have access to sensitive data without users' "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.551
retrieving revision 1.552
diff -u -b -r1.551 -r1.552
--- proprietary-surveillance.ru.po 21 Jul 2019 17:29:00 -0000 1.551
+++ proprietary-surveillance.ru.po 30 Jul 2019 08:29:18 -0000 1.552
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-21 16:56+0000\n"
+"POT-Creation-Date: 2019-07-30 08:25+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-30 08:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1155,23 +1156,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов на
базе Android, и иногда <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑи даннÑе годами</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Ðа оÑÑÑÐ»ÐºÑ Ð´Ð°Ð½Ð½ÑÑ
в Google в ÑелеÑоне должнÑ
оÑвеÑаÑÑ Ð½ÐµÑвободнÑе пÑогÑаммÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -1575,6 +1559,32 @@
"ÑазÑабаÑÑваеÑÑÑ Ð½Ð¾Ð²Ð°Ñ Ð¿ÑогÑамма</a>."
#. type: Content of: <ul><li><p>
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
+msgstr ""
+"Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов на
базе Android, и иногда <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
+"police.html\"> Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑи даннÑе годами</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+"Ðа оÑÑÑÐ»ÐºÑ Ð´Ð°Ð½Ð½ÑÑ
в Google в ÑелеÑоне должнÑ
оÑвеÑаÑÑ Ð½ÐµÑвободнÑе пÑогÑаммÑ."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Many Android phones come with a huge number of <a href=\"https://elpais.com/"
"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- pt-br.po 22 Jul 2019 05:58:39 -0000 1.146
+++ pt-br.po 30 Jul 2019 08:29:18 -0000 1.147
@@ -3652,10 +3652,15 @@
"para proteger a privacidade dos usuários."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"O Google acompanha os movimentos de telefones Android e, Ã s vezes, <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- ru.po 21 Jul 2019 17:58:41 -0000 1.248
+++ ru.po 30 Jul 2019 08:29:18 -0000 1.249
@@ -4731,10 +4731,19 @@
"заÑиÑÑ Ð»Ð¸Ñной жизни полÑзоваÑелей."
#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+# | Google tracks the movements of Android [-phones,-] {+phones and iPhones
+# | running Goggle apps,+} and sometimes <a
+# |
href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
+# | saves the data for years</a>.
+#, fuzzy
+#| msgid ""
+#| "Google tracks the movements of Android phones, and sometimes <a href="
+#| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#| "tracking-police.html\"> saves the data for years</a>."
+msgid ""
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
"Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов на
базе Android, и иногда <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
@@ -10621,6 +10630,15 @@
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ ÑелеÑонов
на базе Android, и иногда <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
+#~ "tracking-police.html\"> Ñ
ÑÐ°Ð½Ð¸Ñ ÑÑи даннÑе годами</a>."
+
+#~ msgid ""
#~ "It should be illegal to have such a device in your apartment without "
#~ "getting signed consent from the people that live in the other appartments "
#~ "in the building."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- zh-tw.po 21 Jul 2019 17:00:30 -0000 1.114
+++ zh-tw.po 30 Jul 2019 08:29:18 -0000 1.115
@@ -3305,9 +3305,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
-"police.html\"> saves the data for years</a>."
+"Google tracks the movements of Android phones and iPhones running Goggle "
+"apps, and sometimes <a href=\"https://www.nytimes.com/interactive/2019/04/13/"
+"us/google-location-tracking-police.html\"> saves the data for years</a>."
msgstr ""
#. type: Content of: <ul><li><p>