[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 3 Aug 2019 07:31:26 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/08/03 07:31:26
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.459&r2=1.460
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.553&r2=1.554
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.116&r2=1.117
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- de.po 30 Jul 2019 08:29:17 -0000 1.116
+++ de.po 3 Aug 2019 11:31:14 -0000 1.117
@@ -7902,6 +7902,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- es.po 30 Jul 2019 08:29:17 -0000 1.157
+++ es.po 3 Aug 2019 11:31:15 -0000 1.158
@@ -6879,6 +6879,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- fr.po 30 Jul 2019 10:28:14 -0000 1.201
+++ fr.po 3 Aug 2019 11:31:15 -0000 1.202
@@ -6582,6 +6582,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- it.po 30 Jul 2019 08:29:17 -0000 1.116
+++ it.po 3 Aug 2019 11:31:15 -0000 1.117
@@ -7449,6 +7449,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- ja.po 30 Jul 2019 08:29:17 -0000 1.123
+++ ja.po 3 Aug 2019 11:31:16 -0000 1.124
@@ -5691,6 +5691,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.de-diff.html 15 Jul 2019 10:02:20 -0000 1.60
+++ malware-mobiles.de-diff.html 3 Aug 2019 11:31:16 -0000 1.61
@@ -480,6 +480,17 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -1376,7 +1387,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/08/03 11:31:16 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-mobiles.de.po 15 Jul 2019 10:02:20 -0000 1.117
+++ malware-mobiles.de.po 3 Aug 2019 11:31:16 -0000 1.118
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -859,6 +859,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- malware-mobiles.es.po 17 Jul 2019 09:53:46 -0000 1.136
+++ malware-mobiles.es.po 3 Aug 2019 11:31:16 -0000 1.137
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -717,6 +718,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- malware-mobiles.fr.po 15 Jul 2019 11:32:42 -0000 1.162
+++ malware-mobiles.fr.po 3 Aug 2019 11:31:16 -0000 1.163
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2019-07-15 13:32+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -715,6 +716,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.it-diff.html 15 Jul 2019 10:02:20 -0000 1.65
+++ malware-mobiles.it-diff.html 3 Aug 2019 11:31:16 -0000 1.66
@@ -530,6 +530,17 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -1420,7 +1431,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/08/03 11:31:16 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-mobiles.it.po 15 Jul 2019 10:02:20 -0000 1.117
+++ malware-mobiles.it.po 3 Aug 2019 11:31:16 -0000 1.118
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -810,6 +810,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- malware-mobiles.ja-diff.html 15 Jul 2019 10:02:20 -0000 1.81
+++ malware-mobiles.ja-diff.html 3 Aug 2019 11:31:16 -0000 1.82
@@ -490,6 +490,17 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -1262,7 +1273,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:20 $
+$Date: 2019/08/03 11:31:16 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- malware-mobiles.ja.po 15 Jul 2019 10:02:20 -0000 1.107
+++ malware-mobiles.ja.po 3 Aug 2019 11:31:16 -0000 1.108
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -608,6 +608,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-mobiles.pot 15 Jul 2019 10:02:20 -0000 1.83
+++ malware-mobiles.pot 3 Aug 2019 11:31:16 -0000 1.84
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -487,6 +487,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a "
+"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">
"
+"bypass user's settings</a>, regulations, and privacy-enhancing features of "
+"the operating system, in order to gather as much private data as they "
+"possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a "
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\">
"
"not to allow them access to locations</a>."
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- malware-mobiles.ru.po 15 Jul 2019 11:01:09 -0000 1.196
+++ malware-mobiles.ru.po 3 Aug 2019 11:31:16 -0000 1.197
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -706,6 +707,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- nl.po 2 Aug 2019 11:59:44 -0000 1.117
+++ nl.po 3 Aug 2019 11:31:16 -0000 1.118
@@ -5245,6 +5245,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- pl.po 30 Jul 2019 08:29:18 -0000 1.116
+++ pl.po 3 Aug 2019 11:31:16 -0000 1.117
@@ -4581,6 +4581,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- pot 30 Jul 2019 08:29:18 -0000 1.115
+++ pot 3 Aug 2019 11:31:16 -0000 1.116
@@ -4373,6 +4373,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary-surveillance.de-diff.html 30 Jul 2019 08:29:18 -0000
1.88
+++ proprietary-surveillance.de-diff.html 3 Aug 2019 11:31:16 -0000
1.89
@@ -1203,301 +1203,344 @@
<li><p>A Motorola phone
<a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
listens</strong></del></span> <span class="inserted"><ins><em>nonfree
software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ paying</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul class="blurbs">
- <li id="M201907080">
- <p>Many</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
- Street Journal (in</strong></del></span> <span
class="inserted"><ins><em>apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves</em></ins></span> an <span
class="removed"><del><strong>article blocked from us</strong></del></span>
<span class="inserted"><ins><em>apparently unintentional weakness in Android,
- exploited intentionally</em></ins></span> by <span
class="inserted"><ins><em>malicious apps.</p>
- </li>
-
- <li id="M201905300">
- <p>The Femm “fertility” app is
secretly</em></ins></span> a <span class="removed"><del><strong>paywall)
- reports that</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a> by natalist Christians. It spreads distrust
- for contraception.</p>
-
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
- </li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>event.</p>
-
- <p>This app is a spyware that</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS</strong></del></span>
<span class="inserted"><ins><em>snoop on a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>contact
list,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>has</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p></em></ins></span>
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command and users cannot stop them:
<a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
(The US says it will eventually require all new portable phones
to have GPS.)</p>
</li>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>pregnancy
monitoring apps</em></ins></span> is <span class="inserted"><ins><em>often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>use
of</strong></del></span>
- data <span class="removed"><del><strong>on the user's computer, but it
does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>is “anonymized and
aggregated,”</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>can easily be
- traced back</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p>
+ <li><p>The nonfree Snapchat app's principal purpose is to
restrict
+ the use of data on the user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li>
- <p>The moviepass app</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+ <p>The moviepass app and dis-service spy on users even more than
users
+ expected. It</strong></del></span>
- <p>This has harmful implications for women's rights to equal
employment</em></ins></span>
- and <span class="removed"><del><strong>dis-service spy on
users</strong></del></span> <span class="inserted"><ins><em>freedom to make
their own pregnancy choices. Don't use
- these apps,</em></ins></span> even <span class="inserted"><ins><em>if
someone offers you a reward to do so. A
- free-software app that does</em></ins></span> more <span
class="removed"><del><strong>than users
- expected. It</strong></del></span> <span class="inserted"><ins><em>or
less the same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>after going to a movie</a>.
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>after going</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
+ of the operating system, in order</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
</p>
- <p>Don't be tracked — pay cash!</p>
- </li>
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>gather as
much private data as
+ they possibly can.</p>
- <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
+ <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907080">
+ <p>Many Android</em></ins></span> apps can
+ <span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"></strong></del></span>
track <span class="removed"><del><strong>your every move</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google tracks the movements of Android phones</em></ins></span>
and <span class="removed"><del><strong>email addresses</a> in user's
address
- book to developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>iPhones
- running Goggle apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>words
+ <li><p>The Sarahah app</strong></del></span>
+ <span class="inserted"><ins><em>users' movements even when the user
says</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring</strong></del></span> <span class="inserted"><ins><em>allow
them access</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>Facebook's</strong></del></span>
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it
may</strong></del></span> be <span class="removed"><del><strong>analyzing
people's conversations</strong></del></span> <span
class="inserted"><ins><em>responsible for sending
- the location data</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="removed"><del><strong>listens all the time,</strong></del></span> <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
+ for contraception.</p>
+
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots</strong></del></span>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging
by</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have</em></ins></span> access <span
class="removed"><del><strong>it demands</strong></del></span> to <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>sensitive</em></ins></span> data <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>device</a>.
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
</p>
</li>
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install</strong></del></span> on <span
class="removed"><del><strong>some of its phones. The app will give Verizon the
same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ announced an opt-in</strong></del></span> <span
class="inserted"><ins><em>run a</em></ins></span> proprietary <span
class="removed"><del><strong>search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
they use its search engine.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>have access to</em></ins></span>
- the <span class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to the data. This
results in massive
- surveillance</em></ins></span> on <span class="removed"><del><strong>only
one phone</a>, and</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>phone app</a> to be allowed
into</em></ins></span>
+ the <span class="inserted"><ins><em>event.</p>
+
+ <p>This</em></ins></span> app is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>a lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="inserted"><ins><em>contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>has absolutely no control.</p></em></ins></span>
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
+ <li><p>A</strong></del></span>
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone, and in server
accounts,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> it <span
class="removed"><del><strong>can
- alter them too</a>.
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and</em></ins></span> pregnancy <span
class="removed"><del><strong>test controller application not only
+ can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span>
+ <span class="inserted"><ins><em>data is
“anonymized</em></ins></span> and <span class="removed"><del><strong>in
server accounts,</strong></del></span> <span
class="inserted"><ins><em>aggregated,”</em></ins></span> it can
+ <span class="removed"><del><strong>alter them too</a>.
</p></li>
<li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ movements before and after</strong></del></span> <span
class="inserted"><ins><em>easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
- <p>This example illustrates how “getting the user's
consent”</strong></del></span>
- for <span class="removed"><del><strong>surveillance is inadequate as a
protection</strong></del></span> <span class="inserted"><ins><em>invasive
advertising or discriminating</em></ins></span> against <span
class="removed"><del><strong>massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>people in poor
- medical condition.</p>
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>woman who
uses</em></ins></span> the <span class="removed"><del><strong>user's
consent”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
+ free-software</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
- <li><p>Apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>include
+ <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>what radio
and TV programs
are playing nearby</a>. Also on what users post on various sites
- such</strong></del></span> <span class="inserted"><ins><em>released
them, apparently not realizing that all the personal
- data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p></em></ins></span>
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>Twitter.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <li><p>Facebook's</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a</em></ins></span> new <span class="removed"><del><strong>Magic Photo
app</strong></del></span> <span class="inserted"><ins><em>one is being
developed</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Goggle apps, and sometimes</em></ins></span> <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers</em></ins></span> is in <span
class="removed"><del><strong>the frame.</p>
-
- <p>This spyware feature</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
- Google's policies. But it</em></ins></span> seems <span
class="inserted"><ins><em>that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>require online access to some
- known-faces database, which means the pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>take
action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>wire to
Facebook's servers and face-recognition
+scans your mobile phone's photo collections</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>known faces</a>,
+ and suggests you to share</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>location data</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+ </li>
+
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have</em></ins></span> access to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it
on</em></ins></span> to <span class="removed"><del><strong>be
+ sent across the wire</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have
access</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
algorithms.</p>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>a development platform</em></ins></span> are
<span class="removed"><del><strong>private
- anymore, even if</strong></del></span> <span
class="inserted"><ins><em>ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span>
+ the <span class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
</li>
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>data.
This results in massive
+ surveillance</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>which the
user has absolutely no control.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>some
- are starting</strong></del></span> <span class="inserted"><ins><em>often
malicious ads on users, and redirecting
- them</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>phishing sites</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+ demanded users submit to increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ medical condition.</p>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong><a
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows the <a
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is a typical example</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of
- <span class="removed"><del><strong>the attitude</strong></del></span>
<span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
+ lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>are
difficult</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>a typical example of
+ the attitude of the proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <li><p>Many proprietary</strong></del></span> <span
class="inserted"><ins><em>them was designed to make uninstallation
- difficult.</p>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
- <p>Users should of course uninstall these
dangerous</em></ins></span> apps <span class="removed"><del><strong>for mobile
devices report which other</strong></del></span> <span
class="inserted"><ins><em>if they
- haven't yet, but they should also stay away from nonfree</em></ins></span>
apps <span class="removed"><del><strong>the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> in
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span class="removed"><del><strong>visible and
- optional</a>. Not as bad as</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span
class="removed"><del><strong>the others</strong></del></span> <span
class="inserted"><ins><em>they really</em></ins></span> do.</p>
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
+ apps the user has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
- gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the
user</a>. This is in addition to
+ the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them</em></ins></span> was <span
class="removed"><del><strong>found</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to make <span
class="inserted"><ins><em>uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
- <li><p>Widely</strong></del></span>
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
+ <p>It is unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
@@ -1505,65 +1548,39 @@
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>OS in</strong></del></span> <span
class="inserted"><ins><em>users of what it will do
- with</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>question of
whether</strong></del></span> <span class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a
secondary issue. The principal wrong here is that
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
+
+ <p>I think that lawsuit is about a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ tracking people's locations.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
- <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <li id="M201812290">
+ <p>Around 40%</em></ins></span> of <span
class="inserted"><ins><em>gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
- various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
- the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
- account.</p></em></ins></span>
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was found to make</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
@@ -3525,7 +3542,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/30 08:29:18 $
+$Date: 2019/08/03 11:31:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary-surveillance.de.po 30 Jul 2019 08:29:18 -0000 1.303
+++ proprietary-surveillance.de.po 3 Aug 2019 11:31:16 -0000 1.304
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1940,6 +1940,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.459
retrieving revision 1.460
diff -u -b -r1.459 -r1.460
--- proprietary-surveillance.fr.po 30 Jul 2019 10:28:14 -0000 1.459
+++ proprietary-surveillance.fr.po 3 Aug 2019 11:31:16 -0000 1.460
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2019-07-30 11:46+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1475,6 +1476,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-surveillance.it-diff.html 30 Jul 2019 08:29:18 -0000
1.155
+++ proprietary-surveillance.it-diff.html 3 Aug 2019 11:31:16 -0000
1.156
@@ -1043,18 +1043,29 @@
<span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span>
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ send lots</em></ins></span> of <span class="removed"><del><strong>its
phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>data to Adobe</a>. Adobe's
“excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -1071,19 +1082,26 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact</em></ins></span> that <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
- makes</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
-
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The
app will give Verizon</strong></del></span> <span
class="inserted"><ins><em>nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for</em></ins></span> the <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>legal threat
demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is</em></ins></span> not <span class="removed"><del><strong>only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure
for the injustice</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It
may avoid
+ paying for</em></ins></span> the <span class="removed"><del><strong>phone,
and in server accounts,</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it
<span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>less nasty.</p>
</li>
</ul>
@@ -1093,240 +1111,205 @@
</div>
<ul class="blurbs">
- <li id="M201907080">
- <p>Many Android apps can track</em></ins></span>
- users' <span class="removed"><del><strong>searches that Google normally
gets</strong></del></span> <span class="inserted"><ins><em>movements
even</em></ins></span> when
- <span class="removed"><del><strong>they use its search engine.</p>
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
- <p>Currently,</strong></del></span> the <span
class="inserted"><ins><em>user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ <p>This example illustrates how
“getting</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
+ of</em></ins></span> the <span class="removed"><del><strong>user's
consent”
+ for surveillance is inadequate</strong></del></span> <span
class="inserted"><ins><em>operating system, in order to
gather</em></ins></span> as <span class="removed"><del><strong>a
protection</strong></del></span> <span class="inserted"><ins><em>much private
data as
+ they possibly can.</p>
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
+ <p>Thus, we can't trust rules</em></ins></span> against <span
class="removed"><del><strong>massive
+ surveillance.</p>
</li>
- <li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app is <span
class="inserted"><ins><em>secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a> by natalist Christians. It spreads distrust
- for contraception.</p>
-
- <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>, and the
- user</strong></del></span> <span class="inserted"><ins><em>users, too, as
you</em></ins></span> must <span class="removed"><del><strong>explicitly opt-in
before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>expect from nonfree
- programs.</p></em></ins></span>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying. What we can trust is
+ having control over the software we run.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>proprietary phone
app</a> to be allowed into
- the event.</p>
+ <span class="inserted"><ins><em><li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
- <p>This app is a spyware that</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li id="M201904131">
- <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
-
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
+ and suggests</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ for contraception.</p>
- <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
- free-software</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <p>It snoops on users, too, as</em></ins></span> you <span
class="inserted"><ins><em>must expect from nonfree
+ programs.</p>
</li>
- <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>does more or less
the same thing without
- spying</em></ins></span> on <span class="removed"><del><strong>various
sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>Twitter.</p>
- </li>
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
+ is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
+ the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
- <li><p>Facebook's</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a</em></ins></span> new <span class="removed"><del><strong>Magic Photo
app</strong></del></span> <span class="inserted"><ins><em>one is being
developed</a>.</p>
+ <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
- <li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Goggle apps, and sometimes</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>known faces</a>,
- and suggests you to share</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can
easily</em></ins></span> be
+ <span class="removed"><del><strong>sent across</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>location data</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
- </li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have</em></ins></span> access to <span
class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it
on to user-installed apps that have access</em></ins></span> to <span
class="removed"><del><strong>be
- sent across</strong></del></span>
- the <span class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers and face-recognition
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>data. This results in
massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>user has absolutely no
control.</p></em></ins></span>
+ anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
+ these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+ free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is
available from <a
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
- medical condition.</p>
+ are starting to realize that it is nasty.</p>
- <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
- lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>are
difficult</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
- “consent”</em></ins></span> is <span
class="removed"><del><strong>a typical example of
+ <p>This article shows the</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
+ a <span class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="removed"><del><strong>a typical example of
the attitude of the proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize
snooping.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
- apps the user has
- installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
- data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps</strong></del></span>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
<span class="inserted"><ins><em>movements of Android phones</em></ins></span>
and
+ <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
</li>
<li><p>FTC says most mobile apps for children don't respect
privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>iPhones
+ running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>data for years</a>.</p>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by
the OS in the
+ <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>addition to
+ the snooping done by</strong></del></span> the phone <span
class="removed"><del><strong>company, and perhaps by the OS in the
phone.</p>
- <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
- users to say “I agree”. That is no excuse for
malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>total) link</em></ins></span> this <span
class="removed"><del><strong>app because it asked the user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ <p>Don't</strong></del></span> <span class="inserted"><ins><em>has
to</em></ins></span> be <span class="removed"><del><strong>distracted by the
question of whether</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Google.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
+
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
+ the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>weakness of the
reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>user has
absolutely no control.</p>
+ </li>
+
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
+ send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ medical condition.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
- that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
- app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p>
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
+ “consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
+ <h4 id="SpywareInGames">Spyware in Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p></em></ins></span>
+ <li><p>nVidia's</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
+ <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry Birds
+ <li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
+ spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
+ way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
- Here's information</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
+ <li id="M201902140">
+ <p>The AppCensus database gives</em></ins></span> information on
<a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
More about NSA app spying</a>.</p>
</li>
@@ -1340,78 +1323,117 @@
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span class="inserted"><ins><em>malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
- a speech recognition company based in</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>U.S.</p>
+ <p>The “smart” toys My Friend Cayla</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
+ <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in <span
class="removed"><del><strong>on</strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>child's
speech, and even speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
+ into the toys themselves.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <li>
+ <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
body), as well as the vibration frequency.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play found that <a
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p>
+ </li>
+
+ <li id="M201902060">
+ <p>Many nonfree apps</em></ins></span> have
+ <span class="removed"><del><strong>checked and changed.</p>
+
+ <p>The company that made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
+ data broker, the data broker would have been able</strong></del></span>
+ <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them</em></ins></span> to <span class="removed"><del><strong>figure out
+ who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
+ the user <span class="removed"><del><strong>was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>150 most popular
+ gratis VPN apps in Google Play</em></ins></span> found <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>usersâ
privacy</a> due to DNS leaks. In
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>access
the data</a>
+ collected by the manufacturer's</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive
advertising—that</em></ins></span> could <span
class="removed"><del><strong>have
- checked and changed.</p>
-
- <p>The company</strong></del></span>
- <span class="inserted"><ins><em>potentially also be used to spy on users.
Other technical flaws were
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>how
- people used it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
+ <p>It is unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <li id="M201901050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Weather Channel app <a
+ <li id="M201901050">
+ <p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the</em></ins></span> company's <span
class="removed"><del><strong>statement</strong></del></span> <span
class="inserted"><ins><em>server</a>. The company is
- being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>was anonymizing</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>data broker would have been able to figure out
- who</strong></del></span> <span class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>user
was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>data is a secondary issue. The principal wrong
here is that</em></ins></span>
- the company <span class="removed"><del><strong>has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>gets that data at
all.</p>
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
+
+ <p>I think that lawsuit is about a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1420,9 +1442,9 @@
</li>
<li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>gratis Android apps <a
+ <p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>Facebook</a>.</p>
+ report on the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
@@ -1431,42 +1453,33 @@
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ account.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>phones of users
that have deleted them</a>.</p>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
- tracking, but most users will be tricked</em></ins></span> by the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
<p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>save
+ <p>I expect it implements DRM, too—that there is no way to save
a recording. But I can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
@@ -1474,23 +1487,11 @@
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear:</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -1754,8 +1755,10 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
- </li>
+ that snoop are just as wrong as any other</em></ins></span>
snooping.</p>
+
+ <span class="removed"><del><strong><p>That</strong></del></span>
+ <span class="inserted"><ins><em></li>
<li id="M201510300">
<p>More than 73% and 47% of mobile applications, from Android and iOS
@@ -1957,9 +1960,9 @@
<h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
-<div style="clear:</em></ins></span> left;"></div>
+<div style="clear: left;"></div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -2126,16 +2129,19 @@
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+ reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="inserted"><ins><em>stop this, but any
+ product could</em></ins></span> spy <span class="inserted"><ins><em>this
way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -2145,18 +2151,24 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
</li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
@@ -3282,7 +3294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/30 08:29:18 $
+$Date: 2019/08/03 11:31:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- proprietary-surveillance.it.po 30 Jul 2019 08:29:18 -0000 1.316
+++ proprietary-surveillance.it.po 3 Aug 2019 11:31:17 -0000 1.317
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1883,6 +1883,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary-surveillance.ja-diff.html 30 Jul 2019 08:29:18 -0000
1.171
+++ proprietary-surveillance.ja-diff.html 3 Aug 2019 11:31:17 -0000
1.172
@@ -1025,13 +1025,10 @@
makes it even more vicious.</p></em></ins></span>
<p>This <span class="removed"><del><strong>spyware feature seems to
require online access to some
- known-faces database, which means the pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.</p>
</li>
</ul>
@@ -1041,10 +1038,24 @@
</div>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
+ of <span class="removed"><del><strong>Facebook users' pictures
are</strong></del></span> <span class="inserted"><ins><em>the operating system,
in order to gather as much</em></ins></span> private
+ <span class="removed"><del><strong>anymore,</strong></del></span> <span
class="inserted"><ins><em>data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907080">
- <p>Many Android apps can track</em></ins></span>
- users' <span class="removed"><del><strong>pictures are private
- anymore,</strong></del></span> <span
class="inserted"><ins><em>movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
+ <p>Many Android apps can track
+ users' movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
@@ -1068,84 +1079,86 @@
<li id="M201905060">
<p>BlizzCon 2019 imposed a</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
+ demanded users submit</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+ requirement</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting</strong></del></span> <span class="inserted"><ins><em>run a
proprietary phone app</a></em></ins></span> to <span
class="removed"><del><strong>realize that it is
nasty.</p></strong></del></span> <span class="inserted"><ins><em>be
allowed into
+ the event.</p></em></ins></span>
- <p>This article shows the <a
+ <p>This <span class="removed"><del><strong>article shows the <a
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a></em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>be allowed into
- the event.</p>
-
- <p>This app</em></ins></span> is a <span
class="removed"><del><strong>typical example of
- the attitude</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
- <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> is a <span
class="removed"><del><strong>typical example of
+ the attitude</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
<span class="removed"><del><strong>the proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps the user</strong></del></span>
+ <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and</em></ins></span> has
+ <span class="removed"><del><strong>installed.</strong></del></span> <a
<span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
<span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user
has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
is <span class="removed"><del><strong>doing this in a way that at
least</strong></del></span> <span class="inserted"><ins><em>often <a
+ <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>“anonymized</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>aggregated,”
it can easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
+ available</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
- <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+ <p>Don't</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
+ users</strong></del></span> <span
class="inserted"><ins><em>app.</p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>women's rights
to equal employment
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span class="inserted"><ins><em>equal
employment
and freedom to make their own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
free-software app that does more or less the same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely used</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>.
This</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one</em></ins></span> is <span class="removed"><del><strong>in
addition to
- the snooping done by</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
- </li>
-
- <li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones</em></ins></span> and
<span class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>iPhones
- running Goggle apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
-
- <p>Nonfree software</em></ins></span> in the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>phone has to</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>responsible for
sending</em></ins></span>
- the <span class="removed"><del><strong>app developers get
- users</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Google.</p></em></ins></span>
+ spying on you</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to
+ <span class="removed"><del><strong>approve</strong></del></span> <span
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span>
+ <span class="inserted"><ins><em>the location</em></ins></span> data to
<span class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+ </li>
+
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
- the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ the data, or pass</em></ins></span> it <span
class="inserted"><ins><em>on</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access to
+ the network but no direct access to the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
surveillance on which</em></ins></span> the
<span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
</li>
@@ -1232,14 +1245,14 @@
<p>The app reports the temperature</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it is surrounded</strong></del></span>
<span class="inserted"><ins><em>total) link this ID to hardware
identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), and the vibration frequency.</p>
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly, whether
it</strong></del></span> <span class="inserted"><ins><em>resetting it.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>resetting it.</p>
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>surrounded by a person's
+ body), and the vibration frequency.</p>
- <p>Collecting hardware identifiers is in apparent violation of
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>in
apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
@@ -1294,23 +1307,23 @@
haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>do.</p>
</li>
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1327,8 +1340,8 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails of
members</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
+ <p>Specifically, it can collect the emails</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>members of Parliament
this way, because</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
@@ -1403,31 +1416,36 @@
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p>
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
- <li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
+ Kindle:</strong></del></span>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>report even which page</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"></em></ins></span>
+ report <span class="removed"><del><strong>even which
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span>
the <span class="removed"><del><strong>user reads at what
time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>user's
actions to Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>e-reader used
by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></strong></del></span>
<span class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them</em></ins></span> send <span
class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em>Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>whether the user has a Facebook
+ account.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
@@ -1435,54 +1453,45 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted
them</a>.</p></em></ins></span>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in</strong></del></span>
<span class="inserted"><ins><em>it obtains from the same machine
via</em></ins></span>
- various
- <span class="removed"><del><strong>settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>user's activities in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>app; others only say</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
+ anyone</strong></del></span>
- <p>Even if no one connects to</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
-
- <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
- account.</p>
- </li>
-
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>phones
of users that have deleted them</a>.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
+ <p>That's easy to do because</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
@@ -1492,26 +1501,26 @@
</li>
<li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
- <p>If you learn to care much less</em></ins></span> about <span
class="removed"><del><strong>drivers' movements</a>,
- which</strong></del></span> <span class="inserted"><ins><em>sports, you
will benefit in
- many ways. This</em></ins></span> is <span
class="removed"><del><strong>made available</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
+ <p>The case of toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>this article,</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
</li>
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection
systems, mentioned in this article, is not
- really a matter</strong></del></span> <span
class="inserted"><ins><em>the apps were
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of <span class="removed"><del><strong>privacy, and should be replaced with
anonymous
+ payment systems, but</strong></del></span> the <span
class="removed"><del><strong>invasion isn't done</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied</em></ins></span> by <span
class="removed"><del><strong>malware.</strong></del></span> <span
class="inserted"><ins><em>researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
- detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary
<span class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at.</em></ins></span> The other
<span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
in <span class="removed"><del><strong>the car.</p></li>
@@ -1560,27 +1569,28 @@
<li id="M201803050">
<p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
-
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ spy on <span class="removed"><del><strong>their
renters</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span>
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201711240">
+ <li id="M201711240">
<p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>woman came
up</strong></del></span> <span class="inserted"><ins><em>user's movements
around a physical store by noticing WiFi
+ follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>physical store by
noticing WiFi
networks</a>.</p>
</li>
@@ -3139,7 +3149,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/30 08:29:18 $
+$Date: 2019/08/03 11:31:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- proprietary-surveillance.ja.po 30 Jul 2019 08:29:18 -0000 1.297
+++ proprietary-surveillance.ja.po 3 Aug 2019 11:31:17 -0000 1.298
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1410,6 +1410,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary-surveillance.pot 30 Jul 2019 08:29:18 -0000 1.237
+++ proprietary-surveillance.pot 3 Aug 2019 11:31:18 -0000 1.238
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1036,6 +1036,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a "
+"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">
"
+"bypass user's settings</a>, regulations, and privacy-enhancing features of "
+"the operating system, in order to gather as much private data as they "
+"possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a "
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\">
"
"not to allow them access to locations</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.553
retrieving revision 1.554
diff -u -b -r1.553 -r1.554
--- proprietary-surveillance.ru.po 30 Jul 2019 10:30:36 -0000 1.553
+++ proprietary-surveillance.ru.po 3 Aug 2019 11:31:18 -0000 1.554
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-07-30 08:25+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1461,6 +1462,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.de-diff.html 21 Jul 2019 17:00:28 -0000 1.109
+++ proprietary.de-diff.html 3 Aug 2019 11:31:18 -0000 1.110
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -186,6 +186,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -241,19 +252,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul></em></ins></span>
@@ -314,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:28 $
+$Date: 2019/08/03 11:31:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary.de.po 21 Jul 2019 17:00:28 -0000 1.151
+++ proprietary.de.po 3 Aug 2019 11:31:20 -0000 1.152
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -512,22 +527,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary.es.po 22 Jul 2019 10:17:49 -0000 1.190
+++ proprietary.es.po 3 Aug 2019 11:31:20 -0000 1.191
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -410,30 +426,6 @@
"Al parecer se trata de un defecto no intencionado de Android, aprovechado "
"intencionalmente por aplicaciones maliciosas."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans es un buen ejemplo de juego gratuito para móviles que sus "
-"desarrolladores <a href=\"https://gamerant.com/clash-of-clans-addiction/"
-"\">hicieron muy adictivo</a> para un gran número de usuarios
(convirtiéndolo "
-"en una caja registradora para ellos), empleando <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\">técnicas de manipulación "
-"psicológica</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-"El artÃculo utiliza el término <cite>«free»</cite> para significar
«precio "
-"cero», algo que debemos evitar. Recomendamos en su lugar decir: «gratis»."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,6 +505,30 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
+#~ "made very addictive</a> for a large proportion of its users—and "
+#~ "turned into a cash machine for themselves—by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans es un buen ejemplo de juego gratuito para móviles que sus "
+#~ "desarrolladores <a href=\"https://gamerant.com/clash-of-clans-addiction/"
+#~ "\">hicieron muy adictivo</a> para un gran número de usuarios "
+#~ "(convirtiéndolo en una caja registradora para ellos), empleando <a href="
+#~ "\"/proprietary/proprietary-addictions.html#addictiveness\">técnicas de "
+#~ "manipulación psicológica</a>."
+
+#~ msgid ""
+#~ "The article uses “free” to mean “zero price,” "
+#~ "which is a usage we should avoid. We recommend saying “"
+#~ "gratis” instead."
+#~ msgstr ""
+#~ "El artÃculo utiliza el término <cite>«free»</cite> para significar "
+#~ "«precio cero», algo que debemos evitar. Recomendamos en su lugar decir: "
+#~ "«gratis»."
+
+#~ msgid ""
#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- proprietary.fr.po 21 Jul 2019 17:33:20 -0000 1.232
+++ proprietary.fr.po 3 Aug 2019 11:31:21 -0000 1.233
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2019-07-21 19:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -408,31 +424,6 @@
"Cela fait intervenir une faille apparemment involontaire d'Android, qui est "
"exploitée sciemment par les applis malveillantes."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans est un bon exemple de jeu gratuit sur mobile que ses "
-"développeurs <a href=\"https://gamerant.com/clash-of-clans-addiction/\">ont "
-"rendu très addictif</a> pour une grande proportion des joueurs (et qu'ils "
-"ont transformé en machine à cash pour eux-mêmes) en utilisant des <a
href=\"/"
-"proprietary/proprietary-addictions.html#addictiveness\">techniques de "
-"manipulation psychologique</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-"Malheureusement, cet article utilise le mot <cite>free</cite> dans le sens "
-"de « gratuit », ce qui est à éviter. Nous recommandons de le remplacer
par "
-"<cite>gratis</cite>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,3 +497,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
+#~ "made very addictive</a> for a large proportion of its users—and "
+#~ "turned into a cash machine for themselves—by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans est un bon exemple de jeu gratuit sur mobile que ses "
+#~ "développeurs <a href=\"https://gamerant.com/clash-of-clans-addiction/"
+#~ "\">ont rendu très addictif</a> pour une grande proportion des joueurs (et
"
+#~ "qu'ils ont transformé en machine à cash pour eux-mêmes) en utilisant
des "
+#~ "<a href=\"/proprietary/proprietary-addictions.html#addictiveness"
+#~ "\">techniques de manipulation psychologique</a>."
+
+#~ msgid ""
+#~ "The article uses “free” to mean “zero price,” "
+#~ "which is a usage we should avoid. We recommend saying “"
+#~ "gratis” instead."
+#~ msgstr ""
+#~ "Malheureusement, cet article utilise le mot <cite>free</cite> dans le "
+#~ "sens de « gratuit », ce qui est à éviter. Nous recommandons de le "
+#~ "remplacer par <cite>gratis</cite>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.it-diff.html 21 Jul 2019 17:00:28 -0000 1.121
+++ proprietary.it-diff.html 3 Aug 2019 11:31:21 -0000 1.122
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -240,19 +251,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul></em></ins></span>
@@ -313,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:28 $
+$Date: 2019/08/03 11:31:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.it.po 21 Jul 2019 17:00:30 -0000 1.160
+++ proprietary.it.po 3 Aug 2019 11:31:21 -0000 1.161
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -516,22 +531,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.ja-diff.html 21 Jul 2019 17:00:30 -0000 1.124
+++ proprietary.ja-diff.html 3 Aug 2019 11:31:21 -0000 1.125
@@ -182,6 +182,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -237,19 +248,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:30 $
+$Date: 2019/08/03 11:31:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary.ja.po 21 Jul 2019 17:00:30 -0000 1.144
+++ proprietary.ja.po 3 Aug 2019 11:31:21 -0000 1.145
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -380,22 +395,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.nl-diff.html 2 Aug 2019 12:29:43 -0000 1.122
+++ proprietary.nl-diff.html 3 Aug 2019 11:31:21 -0000 1.123
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -240,19 +251,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul></em></ins></span>
@@ -313,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/02 12:29:43 $
+$Date: 2019/08/03 11:31:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.nl.po 2 Aug 2019 11:59:44 -0000 1.134
+++ proprietary.nl.po 3 Aug 2019 11:31:22 -0000 1.135
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -345,6 +345,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -418,22 +433,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.pl-diff.html 21 Jul 2019 17:00:30 -0000 1.139
+++ proprietary.pl-diff.html 3 Aug 2019 11:31:23 -0000 1.140
@@ -128,17 +128,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -183,6 +183,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -238,19 +249,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/21 17:00:30 $
+$Date: 2019/08/03 11:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.pl.po 21 Jul 2019 17:00:30 -0000 1.127
+++ proprietary.pl.po 3 Aug 2019 11:31:23 -0000 1.128
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -592,22 +607,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.pot 21 Jul 2019 17:00:30 -0000 1.124
+++ proprietary.pot 3 Aug 2019 11:31:24 -0000 1.125
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a "
+"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">
"
+"bypass user's settings</a>, regulations, and privacy-enhancing features of "
+"the operating system, in order to gather as much private data as they "
+"possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a "
"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\">even
"
"when it is not supposed to listen</a>. Thus, when one of Google's "
@@ -323,23 +338,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a "
-"href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
-"psychological manipulation techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” "
-"instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary.pt-br.po 22 Jul 2019 05:58:39 -0000 1.191
+++ proprietary.pt-br.po 3 Aug 2019 11:31:24 -0000 1.192
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2019-07-22 02:20-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -296,6 +297,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -404,30 +420,6 @@
"Isso evolve uma aparente falha não intencional no Android, explorada "
"intencionalmente por aplicativos maliciosos."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans é um bom exemplo de um jogo grátis para celular cujos "
-"desenvolvedores <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
-"tornaram muito viciante</a> para uma grande proporção de seus usuários "
-"– e o transformaram em um caixa eletrônico para eles mesmos – "
-"usando <a href=\"/proprietary/proprietary-addictions.html#addictiveness\"> "
-"técnicas de manipulação psicológica</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-"O artigo usa â<i lang=\"en\">free</i>â no sentido de âpreço zeroâ,
uso este "
-"que nós devemos evitar. Recomendamos dizer âgrátisâ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -503,6 +495,29 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
+#~ "made very addictive</a> for a large proportion of its users—and "
+#~ "turned into a cash machine for themselves—by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans é um bom exemplo de um jogo grátis para celular cujos "
+#~ "desenvolvedores <a href=\"https://gamerant.com/clash-of-clans-addiction/"
+#~ "\"> tornaram muito viciante</a> para uma grande proporção de seus "
+#~ "usuários – e o transformaram em um caixa eletrônico para eles "
+#~ "mesmos – usando <a href=\"/proprietary/proprietary-addictions."
+#~ "html#addictiveness\"> técnicas de manipulação psicológica</a>."
+
+#~ msgid ""
+#~ "The article uses “free” to mean “zero price,” "
+#~ "which is a usage we should avoid. We recommend saying “"
+#~ "gratis” instead."
+#~ msgstr ""
+#~ "O artigo usa â<i lang=\"en\">free</i>â no sentido de âpreço
zeroâ, uso "
+#~ "este que nós devemos evitar. Recomendamos dizer âgrátisâ."
+
+#~ msgid ""
#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary.ru.po 21 Jul 2019 17:29:00 -0000 1.268
+++ proprietary.ru.po 3 Aug 2019 11:31:24 -0000 1.269
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-03 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -412,30 +428,6 @@
"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-"Cash of Clans — Ñ
оÑоÑий пÑÐ¸Ð¼ÐµÑ Ð±ÐµÑплаÑной
мобилÑной игÑÑ, коÑоÑÑÑ "
-"ее ÑазÑабоÑÑики Ñделали <a
href=\"https://gamerant.com/clash-of-clans-"
-"addiction/\"> вÑзÑваÑÑей ÑилÑнÑÑ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ</a>
Ñ Ð±Ð¾Ð»ÑÑой доли "
-"полÑзоваÑелей — и пÑевÑаÑили в
авÑомаÑ, пÑоизводÑÑий денÑги Ð´Ð»Ñ "
-"ÑазÑабоÑÑиков, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ <a
href=\"/proprietary/proprietary-addictions."
-"html#addictiveness\"> пÑиемов пÑиÑ
ологиÑеÑкой
манипÑлÑÑии</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-"Ð ÑÑаÑÑе Ñлово “ÑвободнÑй”
иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле нÑлевой ÑенÑ. "
-"ÐÑ ÑекомендÑем вмеÑÑо ÑÑого говоÑиÑÑ
“беÑплаÑнÑй”."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -515,6 +507,29 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Cash of Clans is a good example of a gratis mobile game that its "
+#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
+#~ "made very addictive</a> for a large proportion of its users—and "
+#~ "turned into a cash machine for themselves—by using <a href=\"/"
+#~ "proprietary/proprietary-addictions.html#addictiveness\"> psychological "
+#~ "manipulation techniques</a>."
+#~ msgstr ""
+#~ "Cash of Clans — Ñ
оÑоÑий пÑимеÑ
беÑплаÑной мобилÑной игÑÑ, "
+#~ "коÑоÑÑÑ ÐµÐµ ÑазÑабоÑÑики Ñделали <a
href=\"https://gamerant.com/clash-of-"
+#~ "clans-addiction/\"> вÑзÑваÑÑей ÑилÑнÑÑ
завиÑимоÑÑÑ</a> Ñ Ð±Ð¾Ð»ÑÑой доли "
+#~ "полÑзоваÑелей — и пÑевÑаÑили в
авÑомаÑ, пÑоизводÑÑий денÑги "
+#~ "Ð´Ð»Ñ ÑазÑабоÑÑиков, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ <a
href=\"/proprietary/proprietary-"
+#~ "addictions.html#addictiveness\"> пÑиемов пÑиÑ
ологиÑеÑкой манипÑлÑÑии</a>."
+
+#~ msgid ""
+#~ "The article uses “free” to mean “zero price,” "
+#~ "which is a usage we should avoid. We recommend saying “"
+#~ "gratis” instead."
+#~ msgstr ""
+#~ "Ð ÑÑаÑÑе Ñлово “ÑвободнÑй”
иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле нÑлевой "
+#~ "ÑенÑ. ÐÑ ÑекомендÑем вмеÑÑо ÑÑого
говоÑиÑÑ “беÑплаÑнÑй”."
+
+#~ msgid ""
#~ "The developers of gratis mobile games apply <a href=\"/proprietary/"
#~ "proprietary-addictions.html#addictiveness\"> behavioral manipulation "
#~ "techniques</a> to <a href=\"https://www.psychguides.com/interact/the-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.zh-tw-diff.html 1 Aug 2019 08:28:32 -0000 1.100
+++ proprietary.zh-tw-diff.html 3 Aug 2019 11:31:25 -0000 1.101
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -186,6 +186,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -241,19 +252,6 @@
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
-
- <li id="M201809210">
- <p>Cash of Clans is a good example of a gratis mobile game that its
- developers <a href="https://gamerant.com/clash-of-clans-addiction/">
- made very addictive</a> for a large proportion of its users—and
- turned into a cash machine for themselves—by using <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- psychological manipulation techniques</a>.</p>
-
- <p>The article uses “free” to mean “zero
- price,” which is a usage we should avoid. We recommend saying
- “gratis” instead.</p>
- </li>
</ul></em></ins></span>
@@ -314,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/01 08:28:32 $
+$Date: 2019/08/03 11:31:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.zh-tw.po 1 Aug 2019 07:58:32 -0000 1.111
+++ proprietary.zh-tw.po 3 Aug 2019 11:31:25 -0000 1.112
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-21 16:55+0000\n"
+"POT-Creation-Date: 2019-08-03 11:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -417,6 +417,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
@@ -490,22 +505,6 @@
"intentionally by malicious apps."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Cash of Clans is a good example of a gratis mobile game that its developers "
-"<a href=\"https://gamerant.com/clash-of-clans-addiction/\"> made very "
-"addictive</a> for a large proportion of its users—and turned into a "
-"cash machine for themselves—by using <a href=\"/proprietary/"
-"proprietary-addictions.html#addictiveness\"> psychological manipulation "
-"techniques</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article uses “free” to mean “zero price,” which "
-"is a usage we should avoid. We recommend saying “gratis” instead."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- pt-br.po 1 Aug 2019 20:59:11 -0000 1.149
+++ pt-br.po 3 Aug 2019 11:31:25 -0000 1.150
@@ -5072,6 +5072,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- ru.po 30 Jul 2019 10:59:31 -0000 1.251
+++ ru.po 3 Aug 2019 11:31:25 -0000 1.252
@@ -6535,6 +6535,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- zh-tw.po 1 Aug 2019 08:28:32 -0000 1.116
+++ zh-tw.po 3 Aug 2019 11:31:25 -0000 1.117
@@ -4582,6 +4582,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many unscrupulous mobile-app developers keep finding ways to <a href="
+"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
+"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
+"and privacy-enhancing features of the operating system, in order to gather "
+"as much private data as they possibly can."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Thus, we can't trust rules against spying. What we can trust is having "
+"control over the software we run."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/31
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/31