[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 10 Sep 2019 07:33:44 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/09/10 07:33:43
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.467&r2=1.468
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.561&r2=1.562
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.133&r2=1.134
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- de.po 7 Sep 2019 16:29:27 -0000 1.133
+++ de.po 10 Sep 2019 11:33:42 -0000 1.134
@@ -8025,6 +8025,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- es.po 8 Sep 2019 16:28:37 -0000 1.183
+++ es.po 10 Sep 2019 11:33:42 -0000 1.184
@@ -7080,6 +7080,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- fr.po 8 Sep 2019 06:54:00 -0000 1.231
+++ fr.po 10 Sep 2019 11:33:42 -0000 1.232
@@ -6703,6 +6703,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- it.po 7 Sep 2019 16:29:27 -0000 1.133
+++ it.po 10 Sep 2019 11:33:42 -0000 1.134
@@ -7564,6 +7564,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- ja.po 7 Sep 2019 16:29:27 -0000 1.140
+++ ja.po 10 Sep 2019 11:33:42 -0000 1.141
@@ -5791,6 +5791,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-mobiles.de-diff.html 6 Aug 2019 08:29:29 -0000 1.62
+++ malware-mobiles.de-diff.html 10 Sep 2019 11:33:42 -0000 1.63
@@ -511,6 +511,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -1405,7 +1417,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/06 08:29:29 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-mobiles.de.po 6 Aug 2019 08:29:29 -0000 1.119
+++ malware-mobiles.de.po 10 Sep 2019 11:33:42 -0000 1.120
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -874,6 +874,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-mobiles.es.po 11 Aug 2019 11:02:59 -0000 1.140
+++ malware-mobiles.es.po 10 Sep 2019 11:33:42 -0000 1.141
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -740,6 +741,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- malware-mobiles.fr.po 6 Aug 2019 11:22:24 -0000 1.166
+++ malware-mobiles.fr.po 10 Sep 2019 11:33:42 -0000 1.167
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2019-08-06 13:21+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -739,6 +740,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-mobiles.it-diff.html 6 Aug 2019 08:29:30 -0000 1.67
+++ malware-mobiles.it-diff.html 10 Sep 2019 11:33:42 -0000 1.68
@@ -543,6 +543,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -1444,7 +1456,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/06 08:29:30 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-mobiles.it.po 6 Aug 2019 08:29:30 -0000 1.119
+++ malware-mobiles.it.po 10 Sep 2019 11:33:42 -0000 1.120
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -825,6 +825,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-mobiles.ja-diff.html 6 Aug 2019 08:29:30 -0000 1.83
+++ malware-mobiles.ja-diff.html 10 Sep 2019 11:33:42 -0000 1.84
@@ -504,6 +504,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -1286,7 +1298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/06 08:29:30 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- malware-mobiles.ja.po 6 Aug 2019 08:29:30 -0000 1.109
+++ malware-mobiles.ja.po 10 Sep 2019 11:33:42 -0000 1.110
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -623,6 +623,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-mobiles.pot 6 Aug 2019 08:29:30 -0000 1.85
+++ malware-mobiles.pot 10 Sep 2019 11:33:42 -0000 1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -503,6 +503,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a "
+"href=\"https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/\">
"
+"A US prosecutor has demanded the list of all the 10,000 or more people who "
+"have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a "
"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">
"
"bypass user's settings</a>, regulations, and privacy-enhancing features of "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- malware-mobiles.ru.po 6 Aug 2019 08:58:51 -0000 1.200
+++ malware-mobiles.ru.po 10 Sep 2019 11:33:42 -0000 1.201
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-06 08:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -730,6 +731,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- nl.po 7 Sep 2019 16:29:27 -0000 1.134
+++ nl.po 10 Sep 2019 11:33:42 -0000 1.135
@@ -5332,6 +5332,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- pl.po 7 Sep 2019 16:29:27 -0000 1.133
+++ pl.po 10 Sep 2019 11:33:42 -0000 1.134
@@ -4663,6 +4663,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- pot 7 Sep 2019 16:29:27 -0000 1.132
+++ pot 10 Sep 2019 11:33:42 -0000 1.133
@@ -4455,6 +4455,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-surveillance.de-diff.html 7 Sep 2019 13:29:58 -0000
1.92
+++ proprietary-surveillance.de-diff.html 10 Sep 2019 11:33:42 -0000
1.93
@@ -967,6 +967,18 @@
</div>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -3548,7 +3560,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 13:29:58 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary-surveillance.de.po 7 Sep 2019 13:29:58 -0000 1.307
+++ proprietary-surveillance.de.po 10 Sep 2019 11:33:42 -0000 1.308
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1953,6 +1953,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.467
retrieving revision 1.468
diff -u -b -r1.467 -r1.468
--- proprietary-surveillance.fr.po 7 Sep 2019 13:56:54 -0000 1.467
+++ proprietary-surveillance.fr.po 10 Sep 2019 11:33:42 -0000 1.468
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2019-09-07 15:44+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1476,6 +1477,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary-surveillance.it-diff.html 7 Sep 2019 13:29:58 -0000
1.159
+++ proprietary-surveillance.it-diff.html 10 Sep 2019 11:33:42 -0000
1.160
@@ -1088,20 +1088,21 @@
reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>legal threat
demanding a lot of money.</p>
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is</em></ins></span> not <span class="removed"><del><strong>only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure
for the injustice</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It
may avoid
- paying for</em></ins></span> the <span class="removed"><del><strong>phone,
and in server accounts,</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it
<span class="removed"><del><strong>can
+ makes</em></ins></span> it <span class="removed"><del><strong>can
alter them too</a>.
</p></li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>less nasty.</p>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
+
+ <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the nasty thing, but cannot make it less
nasty.</p>
</li>
</ul>
@@ -1111,135 +1112,141 @@
</div>
<ul class="blurbs">
- <li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of</em></ins></span> the <span class="removed"><del><strong>user's
consent”
- for surveillance is inadequate</strong></del></span> <span
class="inserted"><ins><em>operating system, in order to
gather</em></ins></span> as <span class="removed"><del><strong>a
protection</strong></del></span> <span class="inserted"><ins><em>much private
data as
- they possibly can.</p>
-
- <p>Thus, we can't trust rules</em></ins></span> against <span
class="removed"><del><strong>massive
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program</em></ins></span> is <span class="removed"><del><strong>inadequate
as</strong></del></span> a <span class="removed"><del><strong>protection
against massive
surveillance.</p>
</li>
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying. What we can trust is
- having control over the software we run.</p></em></ins></span>
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle
sight.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
such as Facebook, Google+ and Twitter.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ <p>With a free program there would not be a list of who has installed
+ it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
- and suggests</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
- for contraception.</p>
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>suggests you to share</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
+ of</em></ins></span> the <span class="removed"><del><strong>picture you
take according to who
+ is</strong></del></span> <span class="inserted"><ins><em>operating
system,</em></ins></span> in <span class="removed"><del><strong>the
frame.</p>
- <p>It snoops on users, too, as</em></ins></span> you <span
class="inserted"><ins><em>must expect from nonfree
- programs.</p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are
likely</strong></del></span> <span
class="inserted"><ins><em>order</em></ins></span> to <span
class="removed"><del><strong>be
+ sent across</strong></del></span> <span class="inserted"><ins><em>gather
as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook</strong></del></span> <span
class="inserted"><ins><em>software we run.</p>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
- the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
-
- <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ <li id="M201907080">
+ <p>Many Android apps can track</em></ins></span>
+ users' <span class="removed"><del><strong>pictures are private
+ anymore,</strong></del></span> <span
class="inserted"><ins><em>movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can
easily</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
- and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>based</strong></del></span> <span
class="inserted"><ins><em>secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
+ for contraception.</p>
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
- these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>users,
too, as you must expect from nonfree
+ programs.</p>
</li>
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
- spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is
available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <a
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
+ demanded users submit</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting</strong></del></span> <span class="inserted"><ins><em>run a
proprietary phone app</a></em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
- <p>This article shows the <a
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>be allowed into</em></ins></span>
+ the <span class="removed"><del><strong><a
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
- a <span class="removed"><del><strong>way
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>event.</p>
+
+ <p>This app is a spyware</em></ins></span> that <span
class="removed"><del><strong>they present snooping as</strong></del></span>
<span class="inserted"><ins><em>can snoop on</em></ins></span> a <span
class="removed"><del><strong>way
to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="removed"><del><strong>a typical example of
- the attitude of the proprietary software industry towards
+ whether they want that. This is a typical example of
+ the attitude</strong></del></span> <span
class="inserted"><ins><em>lot</em></ins></span> of
+ <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
<span class="inserted"><ins><em>movements of Android phones</em></ins></span>
and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>the user
has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
is <span class="removed"><del><strong>doing this in a way that at
least</strong></del></span> <span class="inserted"><ins><em>often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even though the
+ data</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>“anonymized</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>aggregated,”
it can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>women's rights
to equal employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>iPhones
- running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>data for years</a>.</p>
-
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>addition to
- the snooping done by</strong></del></span> the phone <span
class="removed"><del><strong>company, and perhaps by the OS in the
- phone.</p>
+ <li><p>Widely used</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>.
This</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one</em></ins></span> is <span class="removed"><del><strong>in
addition to
+ the snooping done by</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
+ </li>
+
+ <li id="M201904130">
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones</em></ins></span> and
<span class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>iPhones
+ running Goggle apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data for years</a>.</p>
+
+ <p>Nonfree software</em></ins></span> in the
+ <span class="removed"><del><strong>phone.</p>
- <p>Don't</strong></del></span> <span class="inserted"><ins><em>has
to</em></ins></span> be <span class="removed"><del><strong>distracted by the
question of whether</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>phone has to</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>responsible for
sending</em></ins></span>
the <span class="removed"><del><strong>app developers get
users</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Google.</p></em></ins></span>
</li>
@@ -1248,24 +1255,24 @@
<span class="inserted"><ins><em><li id="M201903251">
<p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user</strong></del></span>
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the
user</strong></del></span>
<span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
+ preinstalled nonfree apps that have access</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>sensitive</em></ins></span> data <span
class="inserted"><ins><em>without
users' knowledge</a>. These hidden apps may either call home with
- the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
+ the data, or pass it on to user-installed apps that have
access</em></ins></span> to
the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
the
- <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>data. This results in massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>user has
absolutely no control.</p>
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
for invasive advertising or discriminating against people in poor
@@ -1326,90 +1333,52 @@
<p>The “smart” toys My Friend Cayla</strong></del></span>
<span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
<span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
- <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit <span class="inserted"><ins><em>the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone.</strong></del></span>
<span class="inserted"><ins><em>total) link this ID to hardware
identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action.</em></ins></span> This
<span class="inserted"><ins><em>proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps</em></ins></span> have
- <span class="removed"><del><strong>checked and changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
- the user <span class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play</em></ins></span> found <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>that <a
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>access
the data</a>
- collected by the manufacturer's</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
@@ -1755,8 +1724,8 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other</em></ins></span>
snooping.</p>
- <span class="inserted"><ins><em></li>
+ that snoop are just as wrong as any other snooping.</p>
+ </li>
<li id="M201510300">
<p>More than 73% and 47% of mobile applications, from Android and iOS
@@ -1867,9 +1836,9 @@
<li id="M201908151">
<p>Skype refuses to say whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p></em></ins></span>
+ on calls</a>.</p>
- <p>That <span class="inserted"><ins><em>almost certainly means it
can do so.</p>
+ <p>That almost certainly means it can do so.</p>
</li>
<li id="M201307110">
@@ -2128,26 +2097,24 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
+ <p>Proper laws</em></ins></span> would
+ <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>say that TVs are not allowed to report what the
user watches—no exceptions!</p>
</li>
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch</em></ins></span> to <span
class="inserted"><ins><em>stop this, but any
- product could</em></ins></span> spy <span class="inserted"><ins><em>this
way.</p>
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -2157,24 +2124,18 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
@@ -2214,56 +2175,107 @@
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>listen in on</strong></del></span>
<span class="inserted"><ins><em>outsmart you.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it
- into one.</p>
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even
speak</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert
it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user <span class="removed"><del><strong>was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2273,26 +2285,14 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
- products, rather than free software which users could have checked
- and changed.</p>
-
- <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
-
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data
to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>was.</p>
<p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
@@ -3300,7 +3300,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 13:29:58 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary-surveillance.it.po 7 Sep 2019 13:29:58 -0000 1.320
+++ proprietary-surveillance.it.po 10 Sep 2019 11:33:42 -0000 1.321
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1896,6 +1896,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary-surveillance.ja-diff.html 7 Sep 2019 13:29:58 -0000
1.175
+++ proprietary-surveillance.ja-diff.html 10 Sep 2019 11:33:42 -0000
1.176
@@ -1018,19 +1018,40 @@
scans your mobile phone's photo collections for known faces</a>,
and suggests you to share the picture you take
according</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p>
- <p>The fact that this is used for repression of forbidden sharing
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if the user didn't “upload” them to the
service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>running
it</a>. The result</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize</strong></del></span>
+ <span class="inserted"><ins><em>often a legal threat demanding a lot of
money.</p>
+
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> is <span
class="removed"><del><strong>nasty.</p></strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
makes it even more vicious.</p></em></ins></span>
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.</p>
+ <p>This <span class="removed"><del><strong>article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1038,146 +1059,98 @@
</div>
<ul class="blurbs">
- <li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
- of <span class="removed"><del><strong>Facebook users' pictures
are</strong></del></span> <span class="inserted"><ins><em>the operating system,
in order to gather as much</em></ins></span> private
- <span class="removed"><del><strong>anymore,</strong></del></span> <span
class="inserted"><ins><em>data as
+ <li id="M201909060">
+ <p>Keeping track of who downloads a</em></ins></span> proprietary
<span class="removed"><del><strong>apps for mobile devices report which other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span class="inserted"><ins><em>program</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way that at least</strong></del></span> <span
class="inserted"><ins><em>form of surveillance. There</em></ins></span> is
<span class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what the others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>a
+ proprietary program</em></ins></span> for <span
class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>adjusting a
certain telescopic rifle sight.</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>operating system,</em></ins></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>order</em></ins></span> to <span
class="inserted"><ins><em>gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ having control over</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>software we
run.</p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users' movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
+ users' movements even when</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
- </li>
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>the
+ phone.</p>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+ <p>Don't be distracted</strong></del></span> <span
class="inserted"><ins><em>Android,
+ exploited intentionally</em></ins></span> by <span
class="removed"><del><strong>the question of whether the</strong></del></span>
<span class="inserted"><ins><em>malicious apps.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>based</strong></del></span> <span
class="inserted"><ins><em>secretly a <a
+ <li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="removed"><del><strong>developers get
+ users to say “I agree”. That</strong></del></span> is <span
class="removed"><del><strong>no excuse</strong></del></span> <span
class="inserted"><ins><em>secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a> by natalist Christians. It spreads distrust
+ tool</em></ins></span> for <span
class="removed"><del><strong>malware.</p></strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>users,
too, as you must expect from nonfree
- programs.</p>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>run a
proprietary phone app</a></em></ins></span> to <span
class="removed"><del><strong>realize that it is
nasty.</p></strong></del></span> <span class="inserted"><ins><em>be
allowed into
- the event.</p></em></ins></span>
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
- <p>This <span class="removed"><del><strong>article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> is a <span
class="removed"><del><strong>typical example of
- the attitude</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop on a lot</em></ins></span> of
<span class="removed"><del><strong>the proprietary software industry towards
- those they have subjugated.</p>
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive</em></ins></span> data, including <span
class="removed"><del><strong>geolocation, for use by
companies.</a></p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user</strong></del></span>
- <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and</em></ins></span> has
- <span class="removed"><del><strong>installed.</strong></del></span> <a
<span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and
- optional</a>. Not as bad as what</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
+ <p>The FTC criticized this app because it
asked</strong></del></span> <span class="inserted"><ins><em>user's location and
contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
- users</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="inserted"><ins><em>can
easily be
+ traced back</em></ins></span> to <span class="removed"><del><strong>other
companies. This shows</strong></del></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span class="inserted"><ins><em>equal
employment
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>surveillance:
why should</strong></del></span> <span class="inserted"><ins><em>equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to
- <span class="removed"><del><strong>approve</strong></del></span> <span
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span>
- <span class="inserted"><ins><em>the location</em></ins></span> data to
<span class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+ these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
+ <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
</li>
-
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass</em></ins></span> it <span
class="inserted"><ins><em>on</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access to
- the network but no direct access to the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
- surveillance on which</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
- </li>
-
- <li id="M201903201">
- <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
- send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
- “consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -1186,22 +1159,25 @@
</div>
<ul>
- <li><p>nVidia's</strong></del></span>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>that does more
or less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -1218,365 +1194,213 @@
<ul>
- <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows</em></ins></span> that <span
class="removed"><del><strong>makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>no one can trust a nonfree program, not even the
- developers</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p>
+ <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued</strong></del></span> <span class="inserted"><ins><em>be
responsible</em></ins></span> for <span class="removed"><del><strong>collecting
lots</strong></del></span> <span class="inserted"><ins><em>sending
+ the location data to Google.</p>
</li>
- <li id="M201902140">
- <p>The AppCensus database gives</em></ins></span> information <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>on <a
- href="https://www.appcensus.mobi"></em></ins></span> how
- <span class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>Android apps</em></ins></span> use <span
class="removed"><del><strong>it</a>.</p>
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>personal information about how
+ people use it</a>.</p>
- <p>The company's statement that it anonymizes the data may be
- true, but it doesn't really matter. If it sells</strong></del></span>
<span class="inserted"><ins><em>and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>a
- data broker, the data broker can figure out who the user is.</p>
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the</strong></del></span> <span
class="inserted"><ins><em>have access to sensitive</em></ins></span> data <span
class="inserted"><ins><em>without
+ users' knowledge</a>. These hidden apps</em></ins></span> may <span
class="removed"><del><strong>be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>either call home with
+ the data, or pass</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access
to</em></ins></span>
+ the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>a
+ data broker,</strong></del></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>data. This results in
massive
+ surveillance on which</em></ins></span> the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>has absolutely no control.</p></em></ins></span>
</li>
- <li><p>A computerized
- vibrator</strong></del></span> <span class="inserted"><ins><em>other
companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
on its users through the proprietary control app</a>.</p>
<p>The app reports the temperature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly, whether
it</strong></del></span> <span class="inserted"><ins><em>resetting it.</p>
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>surrounded by a person's
- body), and the vibration frequency.</p>
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found that 19 of them
<a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can
use</em></ins></span> it <span class="removed"><del><strong>is surrounded by
a</strong></del></span>
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ medical condition.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in
apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users can check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
-<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
- them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>do.</p>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
+ gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due to DNS leaks. In
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>users.
Other technical flaws were
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of
members</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>are <em>not</em></em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>.</em></ins></span> The
<span class="removed"><del><strong>Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>company</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue.
What the company does
+ <p>I think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
- Kindle:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"></em></ins></span>
- report <span class="removed"><del><strong>even which
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span>
the <span class="removed"><del><strong>user reads at what
time</a>.</p>
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>user's
actions to Facebook</a>.</p>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></strong></del></span>
<span class="inserted"><ins><em>machine's “advertising ID,” so that
+ <p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them</em></ins></span> send <span
class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em>Facebook detailed information about
+ various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>whether the user has a Facebook
- account.</p></em></ins></span>
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
- effectively
- anyone</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>phone company to track the
car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
- <p>If you learn to care much less</em></ins></span> about <span
class="removed"><del><strong>drivers' movements</a>,
- which</strong></del></span> <span class="inserted"><ins><em>sports, you
will benefit in
- many ways. This</em></ins></span> is <span
class="removed"><del><strong>made available</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection
systems, mentioned in this article, is not
- really a matter</strong></del></span> <span
class="inserted"><ins><em>the apps were
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
- detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary
<span class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
- source code they cannot look at.</em></ins></span> The other
- <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
- in <span class="removed"><del><strong>the car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
+ <li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
- <span class="inserted"><ins><em>other but not</em></ins></span> to <span
class="inserted"><ins><em>the server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span</strong></del></span> <span class="inserted"><ins><em>users even
more than users expected. It <a
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
@@ -2294,39 +2118,176 @@
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ minute (thus, indirectly, whether it was surrounded by a</em></ins></span>
person's
+ body), <span class="removed"><del><strong>and</strong></del></span> <span
class="inserted"><ins><em>as well as</em></ins></span> the vibration
frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
+ products, rather than free software which users <span
class="removed"><del><strong>can check
+ and change.</p>
+ </li>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>The company that made the vibrator <a
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>could have
checked
+ and changed.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>company that made</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If</em></ins></span> it <span
class="inserted"><ins><em>had sold the data</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the
+ user <span class="removed"><del><strong>reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>pay a total
of C$4m</a></em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>nonfree software are</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to</em></ins></span> access <span
class="removed"><del><strong>its computers remotely</strong></del></span> <span
class="inserted"><ins><em>the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
@@ -2334,12 +2295,15 @@
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
</li>
<li id="M201502180">
@@ -2352,16 +2316,16 @@
<div class="big-subsection">
<h4 id="SpywareInDrones">Drones</h4>
- <span</em></ins></span> class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ to snoop on other people, DJI</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>in many cases</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2375,78 +2339,123 @@
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
+ when</em></ins></span> it <span class="removed"><del><strong>demands blind
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to
listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
- users were easily identified from these recordings.</p>
+ users were easily identified</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ <p>Even if</strong></del></span> <span
class="inserted"><ins><em>these recordings.</p>
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
- </li>
+ <p>Since Google “Assistant” uses proprietary software,
there is</em></ins></span> no <span class="removed"><del><strong>one
connects</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>see or control what it records or sends.</p>
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings</em></ins></span> made <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>joke: The</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt), and sends
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <p>Amazon Alexa collects a lot more</em></ins></span> information
<span class="removed"><del><strong>about drivers' movements</a>,
+ which</strong></del></span> <span class="inserted"><ins><em>from users
+ than</em></ins></span> is <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings</em></ins></span> made <span
class="removed"><del><strong>available to car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on</em></ins></span> other <span
class="removed"><del><strong>day</strong></del></span> <span
class="inserted"><ins><em>servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be accessed</em></ins></span> by <span
class="removed"><del><strong>malware. The</strong></del></span>
+ <span class="inserted"><ins><em>advertising companies and government
agencies. In</em></ins></span> other
+ <span class="removed"><del><strong>cases mentioned</strong></del></span>
<span class="inserted"><ins><em>words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>result, Amazon
has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
+ the devices</em></ins></span> are <span class="removed"><del><strong>done
by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>Apple
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>).</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>.</em></ins></span>
The <span class="removed"><del><strong>company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span>
to <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data
<span class="inserted"><ins><em>processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell</em></ins></span> you <span class="inserted"><ins><em>how and where
it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ tell you how</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>where it's
done”), users have no way
+ to know what happens to</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201902080">
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
- paid for.</p>
+ communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>the user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions in</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges</em></ins></span> that
<span class="removed"><del><strong>was
-before</strong></del></span> <span class="inserted"><ins><em>would otherwise
be in
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
<ul>
<li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>device,
@@ -3157,7 +3166,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 13:29:58 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary-surveillance.ja.po 7 Sep 2019 13:29:58 -0000 1.301
+++ proprietary-surveillance.ja.po 10 Sep 2019 11:33:42 -0000 1.302
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1417,6 +1417,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary-surveillance.pot 7 Sep 2019 13:29:58 -0000 1.241
+++ proprietary-surveillance.pot 10 Sep 2019 11:33:42 -0000 1.242
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1036,6 +1036,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a "
+"href=\"https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/\">
"
+"A US prosecutor has demanded the list of all the 10,000 or more people who "
+"have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a "
"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">
"
"bypass user's settings</a>, regulations, and privacy-enhancing features of "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.561
retrieving revision 1.562
diff -u -b -r1.561 -r1.562
--- proprietary-surveillance.ru.po 9 Sep 2019 07:31:44 -0000 1.561
+++ proprietary-surveillance.ru.po 10 Sep 2019 11:33:42 -0000 1.562
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-07 13:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1462,6 +1463,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.de-diff.html 7 Sep 2019 07:31:39 -0000 1.117
+++ proprietary.de-diff.html 10 Sep 2019 11:33:42 -0000 1.118
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -163,10 +163,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -188,6 +188,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -225,14 +237,6 @@
<p>That almost certainly means it can do so.</p>
</li>
-
- <li id="M201908150">
- <p>Apple is putting DRM on iPhone
- batteries, and the system proprietary software <a
-
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
- off certain features when batteries are replaced other than by
- Apple.</a></p>
- </li>
</ul></em></ins></span>
@@ -293,7 +297,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.de.po 7 Sep 2019 07:31:39 -0000 1.159
+++ proprietary.de.po 10 Sep 2019 11:33:42 -0000 1.160
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -455,6 +455,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -499,14 +513,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.es.po 7 Sep 2019 22:28:49 -0000 1.206
+++ proprietary.es.po 10 Sep 2019 11:33:42 -0000 1.207
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2\n"
@@ -312,6 +313,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -381,19 +396,6 @@
msgid "That almost certainly means it can do so."
msgstr "Casi seguro eso quiere decir que puede hacerlo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"Apple está poniendo DRM en las baterÃas de los iPhone, y el software "
-"privativo del sistema <a href=\"https://www.vice.com/en_us/article/59nz3k/"
-"apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
-"\">desactiva ciertas funcionalidades cuando las baterÃas se sustituyen por "
-"otras que no sean de Apple</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -471,3 +473,15 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "Apple está poniendo DRM en las baterÃas de los iPhone, y el software "
+#~ "privativo del sistema <a href=\"https://www.vice.com/en_us/article/59nz3k/"
+#~ "apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
+#~ "\">desactiva ciertas funcionalidades cuando las baterÃas se sustituyen "
+#~ "por otras que no sean de Apple</a>."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary.fr.po 7 Sep 2019 13:56:54 -0000 1.250
+++ proprietary.fr.po 10 Sep 2019 11:33:42 -0000 1.251
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2019-09-04 16:03+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -375,19 +390,6 @@
msgid "That almost certainly means it can do so."
msgstr "Cela signifie sûrement qu'il en a la possibilité."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"Il y a un DRM dans les batteries de l'iPhone et le système d'exploitation "
-"privateur d'Apple <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-"
-"is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
-"\">désactive certaines fonctionnalités quand les batteries sont remplacées
"
-"par des tiers</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -461,3 +463,15 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "Il y a un DRM dans les batteries de l'iPhone et le système d'exploitation
"
+#~ "privateur d'Apple <a href=\"https://www.vice.com/en_us/article/59nz3k/"
+#~ "apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
+#~ "\">désactive certaines fonctionnalités quand les batteries sont "
+#~ "remplacées par des tiers</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary.it-diff.html 7 Sep 2019 07:31:39 -0000 1.129
+++ proprietary.it-diff.html 10 Sep 2019 11:33:42 -0000 1.130
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -162,10 +162,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -187,6 +187,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -224,14 +236,6 @@
<p>That almost certainly means it can do so.</p>
</li>
-
- <li id="M201908150">
- <p>Apple is putting DRM on iPhone
- batteries, and the system proprietary software <a
-
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
- off certain features when batteries are replaced other than by
- Apple.</a></p>
- </li>
</ul></em></ins></span>
@@ -292,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.it.po 7 Sep 2019 07:31:39 -0000 1.168
+++ proprietary.it.po 10 Sep 2019 11:33:43 -0000 1.169
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -459,6 +459,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -503,14 +517,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.ja-diff.html 7 Sep 2019 07:31:39 -0000 1.132
+++ proprietary.ja-diff.html 10 Sep 2019 11:33:43 -0000 1.133
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -123,8 +123,8 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
@@ -132,8 +132,8 @@
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -222,14 +234,6 @@
<p>That almost certainly means it can do so.</p>
</li>
-
- <li id="M201908150">
- <p>Apple is putting DRM on iPhone
- batteries, and the system proprietary software <a
-
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
- off certain features when batteries are replaced other than by
- Apple.</a></p>
- </li>
</ul></em></ins></span>
@@ -290,7 +294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.ja.po 7 Sep 2019 07:31:39 -0000 1.152
+++ proprietary.ja.po 10 Sep 2019 11:33:43 -0000 1.153
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -319,6 +319,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -363,14 +377,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.nl-diff.html 7 Sep 2019 07:31:39 -0000 1.130
+++ proprietary.nl-diff.html 10 Sep 2019 11:33:43 -0000 1.131
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -162,10 +162,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -187,6 +187,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -224,14 +236,6 @@
<p>That almost certainly means it can do so.</p>
</li>
-
- <li id="M201908150">
- <p>Apple is putting DRM on iPhone
- batteries, and the system proprietary software <a
-
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
- off certain features when batteries are replaced other than by
- Apple.</a></p>
- </li>
</ul></em></ins></span>
@@ -292,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary.nl.po 7 Sep 2019 07:31:39 -0000 1.142
+++ proprietary.nl.po 10 Sep 2019 11:33:43 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -361,6 +361,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -405,14 +419,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.pl-diff.html 7 Sep 2019 07:31:39 -0000 1.147
+++ proprietary.pl-diff.html 10 Sep 2019 11:33:43 -0000 1.148
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
-instances of malicious functionalities (with more than 450 references to
+<p>As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -130,10 +130,10 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -222,14 +234,6 @@
<p>That almost certainly means it can do so.</p>
</li>
-
- <li id="M201908150">
- <p>Apple is putting DRM on iPhone
- batteries, and the system proprietary software <a
-
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
- off certain features when batteries are replaced other than by
- Apple.</a></p>
- </li>
</ul></em></ins></span>
@@ -290,7 +294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.pl.po 7 Sep 2019 07:31:39 -0000 1.135
+++ proprietary.pl.po 10 Sep 2019 11:33:43 -0000 1.136
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -540,6 +540,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -584,14 +598,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.pot 7 Sep 2019 07:31:39 -0000 1.132
+++ proprietary.pot 10 Sep 2019 11:33:43 -0000 1.133
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,6 +257,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a "
+"href=\"https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/\">
"
+"A US prosecutor has demanded the list of all the 10,000 or more people who "
+"have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a "
"href=\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says\">
"
@@ -299,14 +313,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a "
-"href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns
"
-"off certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- proprietary.pt-br.po 10 Sep 2019 10:01:21 -0000 1.211
+++ proprietary.pt-br.po 10 Sep 2019 11:33:43 -0000 1.212
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2019-09-09 22:19-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -305,6 +306,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -372,19 +387,6 @@
msgid "That almost certainly means it can do so."
msgstr "Isso quase com certeza significa que ele pode fazê-lo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"A Apple está inserindo DRM em baterias do iPhone e o software de sistema "
-"proprietário <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">desliga "
-"certos recursos quando as baterias são substituÃdas por outra além da
Apple."
-"</a>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -460,6 +462,18 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "A Apple está inserindo DRM em baterias do iPhone e o software de sistema "
+#~ "proprietário <a
href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair"
+#~ "\">desliga certos recursos quando as baterias são substituÃdas por outra
"
+#~ "além da Apple.</a>"
+
+#~ msgid ""
#~ "Out of 21 gratis Android antivirus apps that were tested by security "
#~ "researchers, eight <a href=\"https://www.comparitech.com/antivirus/"
#~ "android-antivirus-vulnerabilities/\"> failed to detect a test virus</a>. "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.ru.po 9 Sep 2019 07:31:44 -0000 1.284
+++ proprietary.ru.po 10 Sep 2019 11:33:43 -0000 1.285
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,6 +312,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -380,19 +395,6 @@
msgid "That almost certainly means it can do so."
msgstr "ÐÑо поÑÑи навеÑнÑка ознаÑаеÑ, ÑÑо
можеÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-"Apple закладÑÐ²Ð°ÐµÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми в аккÑмÑлÑÑоÑÑ iPhone, и "
-"неÑвободнÑе ÑиÑÑемнÑе пÑогÑÐ°Ð¼Ð¼Ñ <a
href=\"https://www.vice.com/en_us/"
-"article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-"
-"for-diy-repair\">вÑклÑÑаÑÑ Ð¾Ð¿ÑеделеннÑе ÑÑнкÑии,
когда аккÑмÑлÑÑоÑÑ "
-"заменÑÑÑÑÑ ÐºÐµÐ¼-Ñо, кÑоме Apple.</a>"
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -472,6 +474,18 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
+#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
+#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
+#~ "off certain features when batteries are replaced other than by Apple.</a>"
+#~ msgstr ""
+#~ "Apple закладÑÐ²Ð°ÐµÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми в аккÑмÑлÑÑоÑÑ "
+#~ "iPhone, и неÑвободнÑе ÑиÑÑемнÑе пÑогÑÐ°Ð¼Ð¼Ñ <a
href=\"https://www.vice.com/"
+#~ "en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-"
+#~ "nightmare-for-diy-repair\">вÑклÑÑаÑÑ Ð¾Ð¿ÑеделеннÑе
ÑÑнкÑии, когда "
+#~ "аккÑмÑлÑÑоÑÑ Ð·Ð°Ð¼ÐµÐ½ÑÑÑÑÑ ÐºÐµÐ¼-Ñо, кÑоме
Apple.</a>"
+
+#~ msgid ""
#~ "Out of 21 gratis Android antivirus apps that were tested by security "
#~ "researchers, eight <a href=\"https://www.comparitech.com/antivirus/"
#~ "android-antivirus-vulnerabilities/\"> failed to detect a test virus</a>. "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.zh-tw-diff.html 7 Sep 2019 07:31:39 -0000 1.109
+++ proprietary.zh-tw-diff.html 10 Sep 2019 11:33:43 -0000 1.110
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -163,10 +163,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -188,6 +188,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -225,14 +237,6 @@
<p>That almost certainly means it can do so.</p>
</li>
-
- <li id="M201908150">
- <p>Apple is putting DRM on iPhone
- batteries, and the system proprietary software <a
-
href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair">turns
- off certain features when batteries are replaced other than by
- Apple.</a></p>
- </li>
</ul></em></ins></span>
@@ -293,7 +297,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 11:33:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary.zh-tw.po 7 Sep 2019 07:31:39 -0000 1.120
+++ proprietary.zh-tw.po 10 Sep 2019 11:33:43 -0000 1.121
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 11:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,6 +433,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -477,14 +491,6 @@
msgid "That almost certainly means it can do so."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Apple is putting DRM on iPhone batteries, and the system proprietary "
-"software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
-"locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns off "
-"certain features when batteries are replaced other than by Apple.</a>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- pt-br.po 10 Sep 2019 10:01:21 -0000 1.171
+++ pt-br.po 10 Sep 2019 11:33:43 -0000 1.172
@@ -5198,6 +5198,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- ru.po 9 Sep 2019 07:59:27 -0000 1.284
+++ ru.po 10 Sep 2019 11:33:43 -0000 1.285
@@ -6659,6 +6659,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- zh-tw.po 7 Sep 2019 16:29:27 -0000 1.133
+++ zh-tw.po 10 Sep 2019 11:33:43 -0000 1.134
@@ -4664,6 +4664,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Keeping track of who downloads a proprietary program is a form of "
+"surveillance. There is a proprietary program for adjusting a certain "
+"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
+"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
+"names-of-10000-users-of-a-gun-scope-app/\"> A US prosecutor has demanded the "
+"list of all the 10,000 or more people who have installed it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "With a free program there would not be a list of who has installed it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/18