[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 19 Oct 2019 06:01:38 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/10/19 06:01:37
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.313&r2=1.314
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.479&r2=1.480
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.573&r2=1.574
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.149&r2=1.150
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- de.po 16 Oct 2019 07:30:04 -0000 1.149
+++ de.po 19 Oct 2019 10:01:29 -0000 1.150
@@ -833,10 +833,6 @@
"<a href=\"#tyrants\">Tyrannen</a><br />‑ Systeme, die jedes nicht "
"vom Hersteller âautorisierteâ Betriebssystem zurückweisen."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Hintertüren"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -916,7 +912,10 @@
"\" class=\"transnote\">[2]</a>"
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Zensur"
#. type: Content of: <p>
@@ -937,10 +936,6 @@
"zwangsweise Zensur durch den <em>Apple Store</em> einzuführen. Für weitere
"
"Informationen siehe den Abschnitt <a href=\"#jails\">Gefängnisse</a>."
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -1006,7 +1001,10 @@
"gekauften Mediendateien abspielt</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Inkompatibilität"
#. type: Content of: <p>
@@ -1080,7 +1078,10 @@
"Aufbewahrung von Dokumenten als ungeeignet</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Unsicherheit"
#. type: Content of: <p>
@@ -1183,7 +1184,10 @@
"der Mobilfunksoftware von Mobiltelefonen</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Interferenz"
#. type: Content of: <p>
@@ -1208,7 +1212,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Gefängnisse"
#. type: Content of: <p>
@@ -1509,10 +1516,10 @@
"der App selbst zensiert</a> wurde."
#. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
#, fuzzy
#| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Täuschung"
#. type: Content of: <ul><li><p>
@@ -1542,7 +1549,10 @@
# Handlungszwang?
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Zwang"
#. type: Content of: <p>
@@ -1569,7 +1579,10 @@
"man nicht Abonnent des Musikstreaming-Dienstes Apple Music ist."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotage"
#. type: Content of: <p>
@@ -1841,9 +1854,30 @@
"href=\"/proprietary/proprietary-jails\">Apple-Zensur</a> gebilligte "
"Applikationen. Scheinbar war das alles beabsichtigt."
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Ãberwachung"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -2331,7 +2365,10 @@
"Apps gratis sind</a>)."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tyrannen"
#. type: Content of: <ul><li><p>
@@ -10107,6 +10144,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -11276,19 +11336,19 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
"aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -12964,6 +13024,59 @@
"\">Tyrannische Software in Intel-Prozessoren eingebaut</a><a href=\"#tn01\" "
"id=\"tn01-ref\" class=\"transnote\">[1]</a>."
+#~ msgid "Apple Back Doors"
+#~ msgstr "Hintertüren"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Zensur"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Inkompatibilität"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Unsicherheit"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Interferenz"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Gefängnisse"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Täuschung"
+
+# Handlungszwang?
+#~ msgid "Apple Pressuring"
+#~ msgstr "Zwang"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotage"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Ãberwachung"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tyrannen"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
#~ msgid ""
#~ "No game can run on the console unless the console's manufacturer has "
#~ "authorized it. Alas, I can't find a article to cite as a reference for "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- es.po 16 Oct 2019 11:32:07 -0000 1.210
+++ es.po 19 Oct 2019 10:01:30 -0000 1.211
@@ -783,10 +783,6 @@
"<a href=\"#tyrants\">Tiranos</a>: Son sistemas que rechazan cualquier "
"sistema operativo que no esté «autorizado» por el fabricante."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Puertas traseras de Apple"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -857,8 +853,11 @@
"poder porque podemos confiar en Apple, sin lugar a dudas."
#. type: Content of: <h3>
-msgid "Apple Censorship"
-msgstr "Censura de Apple"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
+msgstr "Censura"
#. type: Content of: <p>
msgid ""
@@ -870,10 +869,6 @@
"censura mediante la Apple Store. Para más información, consulte la sección
"
"<a href=\"#jails\">Prisiones de Apple</a>."
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Gestión digital de restricciones en Apple"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -941,8 +936,11 @@
"vÃdeos que han adquirido</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
-msgstr "Incompatibilidad de Apple"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
+msgstr "Incompatibilidad"
#. type: Content of: <p>
msgid ""
@@ -1012,8 +1010,11 @@
"api=v2\">inapropiados para la conservación de documentos</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
-msgstr "Falta de seguridad de Apple"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
+msgstr "Falta de seguridad"
#. type: Content of: <p>
msgid ""
@@ -1111,7 +1112,10 @@
"\">multitud de agujeros en el software de radio de los teléfonos</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Interferencia de Apple"
#. type: Content of: <p>
@@ -1140,8 +1144,11 @@
"otras que no sean de Apple</a>."
#. type: Content of: <h3>
-msgid "Apple Jails"
-msgstr "Prisiones de Apple"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
+msgstr "Prisiones"
#. type: Content of: <p>
msgid ""
@@ -1454,11 +1461,11 @@
"estaba censurando debido al asunto del que trataba</a>."
#. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple-]Manipulation
#, fuzzy
-#| msgid "Apple Deception"
-msgid "Apple Manipulation"
-msgstr "Trampas"
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
+msgstr "Manipulación"
#. type: Content of: <ul><li><p>
msgid ""
@@ -1482,8 +1489,11 @@
"opción», pero en realidad serán muy pocos los que puedan hacerlo."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
-msgstr "Presiones de Apple"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
+msgstr "Presiones"
#. type: Content of: <p>
msgid ""
@@ -1507,8 +1517,11 @@
"Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
-msgstr "Sabotaje de Apple"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
+msgstr "Sabotaje"
#. type: Content of: <p>
msgid ""
@@ -1733,9 +1746,30 @@
"aplicaciones que <a href=\"/proprietary/proprietary-jails.html\">la censura "
"de Apple</a> no aprueba. Al parecer, todo esto fue intencionado."
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Vigilancia de Apple"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
# | In spite of Apple's supposed commitment to privacy, iPhone apps contain
@@ -2107,8 +2141,11 @@
"y recibir el código que Apple le envÃa."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
-msgstr "Tiranos de Apple"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
+msgstr "Tiranos"
#. type: Content of: <ul><li><p>
msgid ""
@@ -9544,6 +9581,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -10677,21 +10737,22 @@
"de ser engañado."
#. type: Content of: <p>
-# | As of April, 2019, the pages in this directory list around 400 instances
-# | of malicious functionalities (with more than 4[-0-]{+5+}0 references to
-# | back them up), but there are surely thousands more we don't know about.
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 400 references to back them "
+#| "of malicious functionalities (with more than 450 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Hasta abril de 2019, las páginas de este directorio ofrecÃan una lista de "
-"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 400 "
+"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
"referencias de apoyo), pero seguramente hay miles más que desconocemos."
#. type: Content of: <table><tr><th>
@@ -12213,6 +12274,58 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Los "
"procesadores Intel incorporarán software tirano</a>."
+#~ msgid "Apple Back Doors"
+#~ msgstr "Puertas traseras de Apple"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Censura de Apple"
+
+#~ msgid "Apple DRM"
+#~ msgstr "Gestión digital de restricciones en Apple"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Incompatibilidad de Apple"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Falta de seguridad de Apple"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Interferencia de Apple"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Prisiones de Apple"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Trampas"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Presiones de Apple"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotaje de Apple"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Vigilancia de Apple"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tiranos de Apple"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 400 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta abril de 2019, las páginas de este directorio ofrecÃan una lista
de "
+#~ "alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 400 "
+#~ "referencias de apoyo), pero seguramente hay miles más que desconocemos."
+
#~ msgid ""
#~ "Apple has <a href=\"https://www.theregister.co.uk/2019/10/02/"
#~ "apple_hong_kong/\"> banned the app that Hong Kong protesters use to "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- fr.po 16 Oct 2019 10:47:17 -0000 1.259
+++ fr.po 19 Oct 2019 10:01:30 -0000 1.260
@@ -719,10 +719,6 @@
"<a href=\"#tyrants\">Tyrans</a> â systèmes qui rejettent tout système "
"d'exploitation non « autorisé » par le fabricant."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Portes dérobées"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -795,7 +791,10 @@
"possède ce pouvoir, car naturellement nous pouvons lui faire confiance."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Censure"
#. type: Content of: <p>
@@ -808,10 +807,6 @@
"censure par l'intermédiaire de l'Apple Store. Pour plus de détails,
reportez-"
"vous à la section <a href=\"#jails\">Prisons</a>."
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -879,7 +874,10 @@
"vidéos qu'ils ont achetées</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Incompatibilité"
#. type: Content of: <p>
@@ -949,7 +947,10 @@
"api=v2\">impropres à la conservation des documents</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Insécurité"
#. type: Content of: <p>
@@ -1038,7 +1039,10 @@
"bogues dans le logiciel de radio des téléphones</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Ingérence"
#. type: Content of: <p>
@@ -1067,7 +1071,10 @@
"par des tiers</a>."
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Prisons"
#. type: Content of: <p>
@@ -1371,7 +1378,10 @@
"censurée à cause de son thème</a>."
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Manipulation"
#. type: Content of: <ul><li><p>
@@ -1397,7 +1407,10 @@
"comprendront comment le faire."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Pression sur le client"
#. type: Content of: <p>
@@ -1422,7 +1435,10 @@
"sur la popularité des chansons si vous n'êtes pas abonné à Apple Miusic."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotage"
#. type: Content of: <p>
@@ -1623,9 +1639,30 @@
"applications non validées par la <a href=\"/proprietary/proprietary-jails."
"html\">censure d'Apple</a>. Tout ceci était apparemment intentionnel."
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1974,7 +2011,10 @@
"et recevoir le code de vérification envoyé dessus par Apple."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tyrans"
#. type: Content of: <ul><li><p>
@@ -8750,6 +8790,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -9722,10 +9785,19 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"En avril 2019, les pages de ce répertoire dénombraient à peu près 400 cas
de "
"fonctionnalités malveillante (appuyés par plus de 450 références), mais
il y "
@@ -11093,3 +11165,48 @@
msgstr ""
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid "Apple Back Doors"
+#~ msgstr "Portes dérobées"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Censure"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Incompatibilité"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Insécurité"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Ingérence"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Prisons"
+
+#~ msgid "Apple Manipulation"
+#~ msgstr "Manipulation"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Pression sur le client"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotage"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Surveillance"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tyrans"
+
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En avril 2019, les pages de ce répertoire dénombraient à peu près 400
cas "
+#~ "de fonctionnalités malveillante (appuyés par plus de 450 références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- it.po 16 Oct 2019 07:30:04 -0000 1.149
+++ it.po 19 Oct 2019 10:01:30 -0000 1.150
@@ -781,10 +781,6 @@
"<a href=\"#tyrants\">Tiranni</a>—sistemi che vietano l'installazione "
"di sistemi operativi non âautorizzatiâ dal produttore."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Backdoor di Apple"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -871,7 +867,10 @@
"potere perché di Apple ci si può fidare, eccome."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Censura di Apple"
#. type: Content of: <p>
@@ -881,10 +880,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM di Apple"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -952,10 +947,10 @@
msgstr ""
#. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
#, fuzzy
#| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Mancata sicurezza di Apple"
#. type: Content of: <p>
@@ -1002,7 +997,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Mancata sicurezza di Apple"
#. type: Content of: <p>
@@ -1109,7 +1107,10 @@
"programmi di radiocomunicazione dei telefoni</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Interferenza di Apple"
#. type: Content of: <p>
@@ -1133,7 +1134,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Prigioni di Apple"
#. type: Content of: <p>
@@ -1527,10 +1531,10 @@
"drone-strikes/\">solo per il tema di cui trattava</a>."
#. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
#, fuzzy
#| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Inganni di Apple"
#. type: Content of: <ul><li><p>
@@ -1556,7 +1560,10 @@
"come farlo."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Pressioni di Apple"
#. type: Content of: <p>
@@ -1581,7 +1588,10 @@
"classifiche musicali se non siete iscritti ad Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotaggio di Apple"
#. type: Content of: <p>
@@ -1825,9 +1835,30 @@
"dalla <a href=\"/proprietary/proprietary-jails.html\">censura di Apple</a>. "
"Tutto questo era apparentemente intenzionale."
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Sorveglianza di Apple"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -2255,7 +2286,10 @@
"che Apple invia a tale indirizzo."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tiranni di Apple"
#. type: Content of: <ul><li><p>
@@ -9450,6 +9484,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -10522,19 +10579,19 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
"ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -12213,6 +12270,60 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">I "
"processori Intel avranno del software tiranno preinstallato</a>."
+#~ msgid "Apple Back Doors"
+#~ msgstr "Backdoor di Apple"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Censura di Apple"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM di Apple"
+
+#, fuzzy
+#~| msgid "Apple Insecurity"
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Mancata sicurezza di Apple"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Mancata sicurezza di Apple"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Interferenza di Apple"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Prigioni di Apple"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Inganni di Apple"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Pressioni di Apple"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Sabotaggio di Apple"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Sorveglianza di Apple"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Tiranni di Apple"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
#, fuzzy
#~| msgid ""
#~| "Game consoles are jails, too: no game can run on the console unless the "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- ja.po 16 Oct 2019 07:30:04 -0000 1.156
+++ ja.po 19 Oct 2019 10:01:30 -0000 1.157
@@ -657,10 +657,6 @@
"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªã"
"ã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Appleã®ããã¯ãã¢"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -731,7 +727,9 @@
"ãã"
#. type: Content of: <h3>
-msgid "Apple Censorship"
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Appleã®æ¤é²"
#. type: Content of: <p>
@@ -741,10 +739,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Appleã®DRM"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -801,7 +795,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -849,7 +843,7 @@
#. type: Content of: <h3>
#, fuzzy
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Appleã®å±éºæ§"
#. type: Content of: <p>
@@ -923,7 +917,7 @@
#. type: Content of: <h3>
#, fuzzy
#| msgid "Apple Surveillance"
-msgid "Apple Interference"
+msgid "Interference"
msgstr "Appleã®ç£è¦"
#. type: Content of: <p>
@@ -947,7 +941,9 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Appleã®ç¢ç"
#. type: Content of: <p>
@@ -1203,7 +1199,7 @@
"æ¤é²ãã¦ãããã¨ãèªãã¾ãã</a>ã"
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1229,7 +1225,9 @@
"証ãã¾ãã"
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Appleã®å§å"
#. type: Content of: <p>
@@ -1253,7 +1251,9 @@
"ãæä¾ãããã¨ãæ絶ãã¾ã</a>ãApple Musicã®è³¼èªè
ã§ãªãå ´åã"
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Appleã®å¦¨å®³"
#. type: Content of: <p>
@@ -1421,9 +1421,30 @@
"é²</a>ã«ãã£ã¦æ¿èªããã¦ããªãã¢ããªã±ã¼ã·ã§ã³ãåæ¢ããã¾ãããããã¯æãã"
"ã«ãã¹ã¦æå³çã§ãã"
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Appleã®ç£è¦"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1738,7 +1759,9 @@
"ãã"
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Appleã®æ´å"
#. type: Content of: <ul><li><p>
@@ -7298,6 +7321,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -8183,9 +8229,9 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
"ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
@@ -9546,6 +9592,52 @@
"<a
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">ã¤ã³ãã«ã®"
"ããã»ããµã«ã¯æ´åã½ããã¦ã§ã¢ãçµã¿è¾¼ã¾ããããã«ãªãã¾ã</a>ã"
+#~ msgid "Apple Back Doors"
+#~ msgstr "Appleã®ããã¯ãã¢"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Appleã®æ¤é²"
+
+#~ msgid "Apple DRM"
+#~ msgstr "Appleã®DRM"
+
+#, fuzzy
+#~ msgid "Apple Insecurity"
+#~ msgstr "Appleã®å±éºæ§"
+
+#, fuzzy
+#~| msgid "Apple Surveillance"
+#~ msgid "Apple Interference"
+#~ msgstr "Appleã®ç£è¦"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Appleã®ç¢ç"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Appleã®å§å"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Appleã®å¦¨å®³"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Appleã®ç£è¦"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Appleã®æ´å"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ã"
+#~
"ã¾ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
+
#~ msgid ""
#~ "No game can run on the console unless the console's manufacturer has "
#~ "authorized it. Alas, I can't find a article to cite as a reference for "
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-apple.de-diff.html 16 Oct 2019 07:30:04 -0000 1.49
+++ malware-apple.de-diff.html 19 Oct 2019 10:01:30 -0000 1.50
@@ -87,7 +87,7 @@
</ul>
</div>
-<h3 id="back-doors">Apple Back Doors</h3>
+<h3 <span class="removed"><del><strong>id="back-doors">Apple
Back</strong></del></span> <span
class="inserted"><ins><em>id="back-doors">Back</em></ins></span>
Doors</h3>
<span class="removed"><del><strong><ul>
<li><p>
Mac</strong></del></span>
@@ -145,7 +145,7 @@
</ul>
-<h3 id="censorship">Apple Censorship</h3>
+<h3 <span class="removed"><del><strong>id="censorship">Apple
Censorship</h3></strong></del></span> <span
class="inserted"><ins><em>id="censorship">Censorship</h3></em></ins></span>
<p>Apple mainly uses iOS, which is a typical jail, to impose censorship
through the Apple Store. Please refer to <span
class="inserted"><ins><em>the</em></ins></span> <a href="#jails">Apple
Jails</a>
@@ -155,7 +155,7 @@
<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
- they do not count as malware. We mention them to
refute</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
+ they do not count as malware. We mention them to
refute</strong></del></span> <span
class="inserted"><ins><em>id="drm">DRM</h3>
<ul class="blurbs">
<li id="M201908150.1">
@@ -226,7 +226,7 @@
<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3>
-<p>Proprietary companies can take advantage</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
+<p>Proprietary companies can take advantage</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Incompatibility</h3>
<p>In this section, we list characteristics</em></ins></span> of <span
class="removed"><del><strong>their customers by imposing arbitrary
limits</strong></del></span> <span class="inserted"><ins><em>Apple programs
that block or
hinder users from switching</em></ins></span> to <span
class="removed"><del><strong>their use of</strong></del></span> <span
class="inserted"><ins><em>any alternative program—and, in
@@ -308,7 +308,7 @@
<span class="inserted"><ins><em></ul>
-<h3 id="insecurity">Apple Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest
of</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file <span
class="removed"><del><strong>system for music files,
copies</strong></del></span>
<span class="inserted"><ins><em>they do not count as malware. We
mention</em></ins></span> them to <span class="removed"><del><strong>an Apple
@@ -318,24 +318,24 @@
<li>
<p>Apple <a
href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops users from fixing</strong></del></span> <span
class="inserted"><ins><em>refute</em></ins></span> the <span
class="removed"><del><strong>security bugs</strong></del></span>
+stops users from fixing</strong></del></span> <span
class="inserted"><ins><em>refute</em></ins></span> the <span
class="removed"><del><strong>security bugs in Quicktime for
+ Windows</a>, while refusing to fix them itself.</p>
+ </li>
+
+ <li>
+ <p>iOS version 9 for
+ iThings</strong></del></span>
<span class="inserted"><ins><em>supposition that prestigious proprietary
software doesn't have grave
bugs.</p>
<ul class="blurbs">
<li id="M201908310">
- <p>A series of vulnerabilities <a
-
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
- in <span class="removed"><del><strong>Quicktime for
- Windows</a>, while refusing</strong></del></span> <span
class="inserted"><ins><em>iOS allowed attackers</em></ins></span> to <span
class="removed"><del><strong>fix them itself.</p>
- </li>
-
- <li>
- <p>iOS version 9 for
- iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <p>A series of vulnerabilities</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
Apple</a>. Apple eventually backed off from this policy under
- criticism from</strong></del></span> <span class="inserted"><ins><em>gain
access to sensitive information
+ criticism from</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
including private messages, passwords, photos and contacts stored
on</em></ins></span>
the <span class="removed"><del><strong>users. However, it has not
acknowledged</strong></del></span> <span class="inserted"><ins><em>user's
iMonster</a>.</p>
@@ -411,7 +411,7 @@
</ul>
-<h3 id="interference">Apple Interference</h3>
+<h3 id="interference">Interference</h3>
<p>Various proprietary programs often mess</em></ins></span> up <span
class="inserted"><ins><em>the user's system. They
are like sabotage, but they are not grave enough</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
Any edits you make</strong></del></span> <span
class="inserted"><ins><em>qualify for the
@@ -434,44 +434,41 @@
</ul>
-<h3 id="jails">Apple Jails</h3>
+<h3 id="jails">Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS,</em></ins></span> the
<span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>operating system</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
“please don't ask where.”</p>
- <p>There</strong></del></span> <span class="inserted"><ins><em>the
Apple iThings,</em></ins></span> is <span class="inserted"><ins><em>the
prototype
-of</em></ins></span> a <span class="removed"><del><strong>way to <a
href="https://support.apple.com/en-us/HT201104">
+ <p>There</strong></del></span> <span class="inserted"><ins><em>the
Apple iThings,</em></ins></span> is <span class="removed"><del><strong>a way to
<a href="https://support.apple.com/en-us/HT201104">
deactivate iCloud</a>, but it's active by default so it still
counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>jail</a>. It was Apple that introduced
the practice</em></ins></span> of <span class="removed"><del><strong>this to
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>the prototype</em></ins></span>
+of <span class="removed"><del><strong>this to
<a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
-<span class="inserted"><ins><em>designing general purpose computers with
censorship</em></ins></span> of <span class="removed"><del><strong>many
celebrities</a>. They needed</strong></del></span> <span
class="inserted"><ins><em>application
+ nude photos</strong></del></span> <span class="inserted"><ins><em>a
jail</a>. It was Apple that introduced the practice</em></ins></span> of
<span class="removed"><del><strong>many celebrities</a>. They needed to
break Apple's
+ security to get at them, but NSA can access any</strong></del></span>
+<span class="inserted"><ins><em>designing general purpose computers with
censorship</em></ins></span> of <span class="removed"><del><strong>them
through</strong></del></span> <span class="inserted"><ins><em>application
programs.</p>
-<p>Here is an article about the <a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that the iThings use</em></ins></span> to <span
class="removed"><del><strong>break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>lock up
the user.</p>
-
-<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of
them</strong></del></span> <span class="inserted"><ins><em>allow limited
passage</em></ins></span> through
- <span class="removed"><del><strong><a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+<p>Here is an article about the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends</strong></del></span> <span
class="inserted"><ins><em>the
+ MacOS automatically sends</strong></del></span>
+<span
class="inserted"><ins><em>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a> that the iThings use</em></ins></span> to <span
class="removed"><del><strong>Apple servers unsaved documents being
+ edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>lock up the user.</p>
+
+<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>Apple servers unsaved documents being
- edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>identify
-themselves.</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
- things you have</strong></del></span> <span
class="inserted"><ins><em>href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is a crack in the prison walls, it
is</em></ins></span> not <span
class="removed"><del><strong>decided</strong></del></span>
-<span class="inserted"><ins><em>big enough</em></ins></span> to <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>mean that the iThings</em></ins></span> are <span
class="removed"><del><strong>even more sensitive than</strong></del></span>
<span class="inserted"><ins><em>no longer jails.</p>
+cannot do this freely because they are required to identify
+themselves. <a href="https://developer.apple.com/xcode/">Here
+are details</a>. While this is a crack in the prison walls, it is not
+big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
@@ -479,30 +476,23 @@
<li id="M201910100">
<p>Apple has <a
href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism">
- banned</em></ins></span> the
- <span class="removed"><del><strong>things you have stored in
files</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app that Hong Kong protesters use to
communicate</a>.</p>
+ banned the app that Hong Kong protesters use to
communicate</a>.</p>
<p>Obeying the “local laws” about what people can do with
- software is no excuse for censoring what software people can
use.</p></em></ins></span>
+ software is no excuse for censoring what software people can use.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910070">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
+ <li id="M201910070">
+ <p>Apple <a
+
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
censors the Taiwan flag in iOS</a> on behalf of the Chinese
- government. When the region is set</em></ins></span> to <span
class="removed"><del><strong>Apple servers without asking permission</a>.
- This exposes</strong></del></span> <span class="inserted"><ins><em>Hong
Kong, this flag is not
- visible in</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>emoji selection widget but is still accessible. When
the
- region is set</em></ins></span> to <span class="removed"><del><strong>Big
Brother and perhaps</strong></del></span> <span
class="inserted"><ins><em>mainland China, all attempts</em></ins></span> to
<span class="removed"><del><strong>other snoops.</p>
-
- <p>It</strong></del></span> <span class="inserted"><ins><em>display it
will result
+ government. When the region is set to Hong Kong, this flag is not
+ visible in the emoji selection widget but is still accessible. When the
+ region is set to mainland China, all attempts to display it will result
in the “empty emoji” icon as if the flag never
existed.</p>
<p>Thus, not only does Apple use the App Store as an instrument
- of censorship, it</em></ins></span> also <span
class="removed"><del><strong>demonstrates</strong></del></span> <span
class="inserted"><ins><em>uses the iThing operating system for that
+ of censorship, it also uses the iThing operating system for that
purpose.</p>
</li>
@@ -510,11 +500,10 @@
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
- companies from figuring out</em></ins></span> how <span
class="removed"><del><strong>you can't trust proprietary software,
- because</strong></del></span> <span class="inserted"><ins><em>those attacks
work.</p>
+ companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable</em></ins></span> even if <span
class="removed"><del><strong>today's version doesn't</strong></del></span>
<span class="inserted"><ins><em>it didn't lead to security threats as
well.</p>
+ inexcusable even if it didn't lead to security threats as well.</p>
</li>
<li id="M201710130">
@@ -592,280 +581,279 @@
not be allowed to censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not</em></ins></span> have <span
class="removed"><del><strong>a malicious
- functionality, tomorrow's version might add it. The developer won't
- remove</strong></del></span> the <span
class="removed"><del><strong>malfeature unless many users push back
hard,</strong></del></span> <span class="inserted"><ins><em>power to impose its
views
+ the real issue. Apple should not have the power to impose its views
about either of these questions, or any other.</p>
</li>
<li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>the users
- can't remove it themselves.</p></strong></del></span> <span
class="inserted"><ins><em>inconsistent
censorship</a>.</p></em></ins></span>
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Various
operations</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405250">
- <p>Apple used this censorship power</em></ins></span> in
- <span class="removed"><del><strong><a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports</strong></del></span> <span
class="inserted"><ins><em>2014</em></ins></span> to <span
class="removed"><del><strong>Apple</a> servers.</p>
- </li>
-
- <li><p>Spyware in MacOS:</strong></del></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms to Apple.</p>
- </li>
-
- <li><p>Apple admits</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the
- <span class="removed"><del><strong><a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>, but there's</strong></del></span>
<span class="inserted"><ins><em>iThings for</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping that</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ <li id="M201405250">
+ <p>Apple used this censorship power in 2014 to <a
+
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ ban all bitcoin apps</a> for the iThings for a time. It also <a
+
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
- about other crimes such as killing people. Perhaps</em></ins></span>
Apple <span class="removed"><del><strong>has not talked
about</a>.</p></strong></del></span> <span
class="inserted"><ins><em>considers
- killing more acceptable than marijuana.</p></em></ins></span>
+ about other crimes such as killing people. Perhaps Apple considers
+ killing more acceptable than marijuana.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201402070">
- <p>Apple rejected an app that displayed the
locations</em></ins></span>
- of <span class="removed"><del><strong>iOS seem to exist for no possible
- purpose other than surveillance</a>. Here is</strong></del></span>
<span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
- time</em></ins></span> the <span class="removed"><del><strong><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-
- <li><p>The <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</strong></del></span>
<span class="inserted"><ins><em>developers fixed one “problem”,
Apple
- complained about another. After</em></ins></span> the <span
class="removed"><del><strong>iThing is, and
- get other info too.</p>
- </li>
-
- <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>fifth rejection, Apple</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
+ <li id="M201402070">
+ <p>Apple rejected an app that displayed the locations
+ of US drone assassinations, giving various excuses. Each
+ time the developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection,
Apple</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ things you have not decided to save are even more sensitive
than</strong></del></span>
<span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>app based on the subject matter</a>.</p>
+ admitted it was censoring</em></ins></span> the
+ <span class="removed"><del><strong>things you have stored in
files</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app based on the subject
matter</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<h3 id="manipulation">Apple Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much</strong></del></span>
+ <p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users, or make option settings hard
- to find</a>.</p>
+ interfaces designed to mislead users, or make option settings
hard</em></ins></span>
+ to <span class="inserted"><ins><em>find</a>.</p>
+
+ <p>This allows a company such as</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
+ This exposes the files</strong></del></span> to <span
class="removed"><del><strong>Big Brother and perhaps</strong></del></span>
<span class="inserted"><ins><em>say, “We allow users</em></ins></span>
+ to <span class="removed"><del><strong>other snoops.</p>
- <p>This allows a company such</em></ins></span> as Apple <span
class="removed"><del><strong>claims</a>.</p></strong></del></span>
<span class="inserted"><ins><em>to say, “We allow users
- to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ <p>It also demonstrates</strong></del></span> <span
class="inserted"><ins><em>turn this off” while ensuring that few will
understand</em></ins></span> how <span class="removed"><del><strong>you can't
trust proprietary software,
+ because even if today's version doesn't have a malicious
+ functionality, tomorrow's version might add it. The developer won't
+ remove the malfeature unless many users push back hard, and the users
+ can't remove</strong></del></span>
+ <span class="inserted"><ins><em>to actually turn</em></ins></span> it
<span class="removed"><del><strong>themselves.</p></strong></del></span>
<span class="inserted"><ins><em>off.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Various operations in
+ <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+<span class="inserted"><ins><em></ul>
-<h3 <span class="removed"><del><strong>id="incompatibility">Apple
Incompatibility</h3>
-<p>In this section, we list characteristics</strong></del></span> <span
class="inserted"><ins><em>id="pressuring">Apple Pressuring</h3>
+<h3 id="pressuring">Pressuring</h3>
-<p>Proprietary companies can take advantage</em></ins></span> of <span
class="removed"><del><strong>Apple programs that block or
-hinder users from switching to any alternative program—and, in
-particular, from switching</strong></del></span> <span
class="inserted"><ins><em>their customers by imposing arbitrary
limits</em></ins></span> to <span class="removed"><del><strong>free software
which can liberate the device</strong></del></span> <span
class="inserted"><ins><em>their use of</em></ins></span> the <span
class="removed"><del><strong>software runs on.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>software.
This section reports examples of hard sell and other unjust commercial tactics
by Apple.</p>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send</strong></del></span> <span
class="inserted"><ins><em>software. This section</em></ins></span> reports
<span class="inserted"><ins><em>examples of hard sell and other unjust
commercial tactics by Apple.</p>
<ul class="blurbs">
- <li id="M201510270"></em></ins></span>
- <p>Apple <span class="removed"><del><strong>devices lock users
in</strong></del></span> <span class="inserted"><ins><em>Siri</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
-solely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
- to <span class="inserted"><ins><em>give you information</a> about
music charts if you're not an</em></ins></span> Apple <span
class="removed"><del><strong>services</a> by being designed to be
incompatible with all
-other options, ethical or unethical.</p></strong></del></span>
- <span class="inserted"><ins><em>Music
subscriber.</p></em></ins></span>
+ <li id="M201510270">
+ <p>Apple Siri <a
+
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
+ to <span class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>give
you information</a> about music charts if you're not an Apple
+ Music subscriber.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>iWork (office software</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em></ul>
-<h3 id="sabotage">Apple Sabotage</h3>
+<h3 id="sabotage">Sabotage</h3>
-<p>These are situations in which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means
-of converting</strong></del></span> <span
class="inserted"><ins><em>harm</em></ins></span> them <span
class="removed"><del><strong>to</strong></del></span> or <span
class="removed"><del><strong>from Open Document Formats</a>. iWork formats
-have changed several times since they were first introduced. This may have
-had the effect</strong></del></span> <span class="inserted"><ins><em>block
their work.</p>
+<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms</strong></del></span>
<span class="inserted"><ins><em>which Apple employs its power over
users</em></ins></span>
+to <span class="removed"><del><strong>Apple.</p>
+ </li>
+
+ <li><p>Apple admits the
+ <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying</strong></del></span> <span class="inserted"><ins><em>directly
intervene</em></ins></span> in <span class="removed"><del><strong>a search
facility</a>, but there's a lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="inserted"><ins><em>harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects a user</em></ins></span> of <span
class="removed"><del><strong>thwarting <a
-href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
-efforts</a>, thus preventing free software from fully supporting
them.</p>
-
-<p>iWork formats are considered <a
-href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p>
-</li>
+ <p>When</em></ins></span> Apple <span
class="removed"><del><strong>has not talked about</a>.</p>
+ </li>
-<li>
-<p>In MacOS and iOS,</strong></del></span> <span
class="inserted"><ins><em>fraud, it
- judges</em></ins></span> the <span class="removed"><del><strong>procedure
for <a
-href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
-converting images from</strong></del></span> <span
class="inserted"><ins><em>case secretly and presents</em></ins></span> the
<span class="removed"><del><strong>Photos
format</a></strong></del></span> <span class="inserted"><ins><em>verdict
- as a fait accompli. The punishment</em></ins></span> to a <span
class="removed"><del><strong>free format</strong></del></span> <span
class="inserted"><ins><em>user found guilty <a
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>suspects a user</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>fraud, it
+ judges the case secretly and presents the verdict
+ as a fait accompli. The punishment</em></ins></span> to <span
class="removed"><del><strong>exist</strong></del></span> <span
class="inserted"><ins><em>a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off for life, which more-or-less cripples the user's Apple
- devices forever</a>. There</em></ins></span> is <span
class="removed"><del><strong>so tedious</strong></del></span> <span
class="inserted"><ins><em>no appeal.</p>
+ being cut off</em></ins></span> for <span class="removed"><del><strong>no
possible
+ purpose other than surveillance</a>. Here is</strong></del></span>
<span class="inserted"><ins><em>life, which more-or-less
cripples</em></ins></span> the <span class="removed"><del><strong><a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user's Apple
+ devices forever</a>. There is no appeal.</p></em></ins></span>
</li>
- <li id="M201810240">
- <p>Apple</em></ins></span> and <span
class="removed"><del><strong>time-consuming that users just give up if they
have a lot</strong></del></span> <span class="inserted"><ins><em>Samsung
deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance</em></ins></span> of <span
class="removed"><del><strong>them.</p></strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810240">
+ <p>Apple and Samsung deliberately</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
+ the <span class="removed"><del><strong>iThing is, and
+ get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>performance of older phones to force users to buy
their newer
phones</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-<h3 id="drm">Apple DRM</h3>
-<ul>
- <li><p>iTunes videos have DRM, which allows</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
<span class="inserted"><ins><em><li id="M201805310">
- <p>Apple has <a
-
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
+ <p>Apple has</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
+ Telegram</em></ins></span> from <span
class="removed"><del><strong>iPhones</strong></del></span> <span
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span
class="removed"><del><strong>the state</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>a
month</a>.</p></em></ins></span>
+
+ <p>This <span class="removed"><del><strong>may have
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to
do</em></ins></span> with
+ <span class="removed"><del><strong><a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
+ </li>
+</ul>
+
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple to <span class="inserted"><ins><em>block
- Telegram in Russia.</p>
+<h3 id="incompatibility">Apple Incompatibility</h3>
- <p>The Telegram client is free software on other platforms, but not
on
+<p>In this section, we list characteristics of</strong></del></span>
<span class="inserted"><ins><em>Russia's command to</em></ins></span> Apple
<span class="removed"><del><strong>programs that block or
+hinder users from switching</strong></del></span> to <span
class="removed"><del><strong>any alternative
program—and,</strong></del></span> <span class="inserted"><ins><em>block
+ Telegram</em></ins></span> in
+<span class="removed"><del><strong>particular, from switching
to</strong></del></span> <span class="inserted"><ins><em>Russia.</p>
+
+ <p>The Telegram client is</em></ins></span> free software <span
class="removed"><del><strong>which can liberate the device
+the software runs on.</p>
+
+<ul>
+<li>
+<p>Apple devices lock users in</strong></del></span> <span
class="inserted"><ins><em>on other platforms, but not on
iThings. Since</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its customers can
- watch the videos</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>,</em></ins></span> they <span
class="removed"><del><strong>purchased</a>.</p></strong></del></span>
<span class="inserted"><ins><em>don't permit any app to be free
software.</p></em></ins></span>
+<span
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+solely</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
+ are jails</a>, they don't permit any app</em></ins></span> to <span
class="removed"><del><strong>Apple services</a> by being
designed</strong></del></span> <span class="inserted"><ins><em>be free
software.</p>
</li>
- <span class="removed"><del><strong><li><p>The
DMCA</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot
drives,</em></ins></span> and <span class="removed"><del><strong>the EU
Copyright Directive make it</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
+ <li id="M201710044">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ changes the file system from HFS+</em></ins></span> to <span
class="inserted"><ins><em>APFS</a>, which cannot</em></ins></span> be
<span class="removed"><del><strong>incompatible with all
+other options, ethical</strong></del></span>
+ <span class="inserted"><ins><em>accessed from GNU/Linux,
Windows</em></ins></span> or <span
class="removed"><del><strong>unethical.</p></strong></del></span> <span
class="inserted"><ins><em>even older versions of
MacOS.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
-
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"></strong></del></span>
+<span class="removed"><del><strong><li>
+<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and</strong></del></span>
<span class="inserted"><ins><em><li id="M201706060">
- <p>Apple will stop <a
-
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
+ <p>Apple will stop</em></ins></span> <a <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork">provides
no means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple <span
class="removed"><del><strong>uses DRM software to prevent</strong></del></span>
<span class="inserted"><ins><em>stops</em></ins></span> people from <span
class="removed"><del><strong>charging an iThing with a
- generic USB cable</a>.</p></li>
-
- <li><p><a
-
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on</strong></del></span> <span class="inserted"><ins><em>fixing
problems themselves;
- that's</em></ins></span> the <span class="removed"><del><strong>fact that
a new model</strong></del></span> <span
class="inserted"><ins><em>nature</em></ins></span> of <span
class="removed"><del><strong>Macbook introduced a requirement
- for monitors to have malicious hardware, but DRM software in MacOS is
- involved in activating the hardware. The software for accessing iTunes
- is also responsible.</p></strong></del></span> <span
class="inserted"><ins><em>proprietary software.</p></em></ins></span>
+ <p>Meanwhile, Apple stops people from fixing problems themselves;
+ that's the nature</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>proprietary software.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704070">
+ <li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains</em></ins></span> DRM <span
class="removed"><del><strong>that caters</strong></del></span> <span
class="inserted"><ins><em>specifically designed</em></ins></span> to <span
class="removed"><del><strong>Bluray disks</a>.
(The</strong></del></span> <span class="inserted"><ins><em><a
+ iPhone 7 contains DRM specifically designed to <a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The</em></ins></span> article <span
class="removed"><del><strong>focused on Windows
- and said that MacOS would do the same thing
subsequently.)</p></li>
-</ul>
-
-<h3 id="jails">Apple Jails</h3>
+ <p>The article uses the term “lock”</em></ins></span>
+ to <span class="removed"><del><strong>or from Open Document
Formats</a>. iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span
class="inserted"><ins><em>describe</em></ins></span> the <span
class="removed"><del><strong>effect of thwarting <a
+href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
+efforts</a>, thus preventing free software from fully supporting
them.</p>
-<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS,</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>operating system of</strong></del></span> <span
class="inserted"><ins><em>term “lock”
- to describe</em></ins></span> the <span class="removed"><del><strong>Apple
iThings, is</strong></del></span> <span class="inserted"><ins><em>DRM, but we
prefer to use</em></ins></span> the <span class="removed"><del><strong>prototype
-of a jail</a>. It was</strong></del></span> <span
class="inserted"><ins><em>term <a
- href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
+<p>iWork formats are considered</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer to use the term</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
+unfit for document preservation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks">
digital
+ handcuffs</a>.</p></em></ins></span>
</li>
- <li id="M201606080">
- <p>Apple <a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops users from fixing the security bugs in Quicktime for
Windows</a>,
- while refusing to fix them itself.</p>
+<span class="removed"><del><strong><li>
+<p>In MacOS and iOS, the procedure for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080">
+ <p>Apple</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
+converting images</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+ stops users</em></ins></span> from <span
class="inserted"><ins><em>fixing</em></ins></span> the <span
class="removed"><del><strong>Photos format</a></strong></del></span>
<span class="inserted"><ins><em>security bugs in Quicktime for
Windows</a>,
+ while refusing</em></ins></span> to <span class="removed"><del><strong>a
free format is so tedious
+and time-consuming that users just give up if they have a lot of
them.</p></strong></del></span> <span class="inserted"><ins><em>fix them
itself.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201605040">
- <p>The</em></ins></span> Apple <span
class="removed"><del><strong>that introduced</strong></del></span> <span
class="inserted"><ins><em>Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
- the <span class="removed"><del><strong>practice of
-designing general purpose computers with censorship of application
-programs.</p>
+<h3 id="drm">Apple DRM</h3>
+<ul>
+ <li><p>iTunes videos have DRM, which allows</strong></del></span>
-<p>Here is</strong></del></span> <span class="inserted"><ins><em>user's
file system for music files, copies them to</em></ins></span> an <span
class="removed"><del><strong>article about the</strong></del></span> <span
class="inserted"><ins><em>Apple server,
- and deletes them</a>.</p>
+ <span class="inserted"><ins><em><li id="M201605040">
+ <p>The</em></ins></span> Apple <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>Music client program</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its customers can
+ watch the videos they purchased</a>.</p>
</li>
- <li id="M201602050">
- <p>iOS version 9 for iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <li><p>The DMCA and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ the <span class="removed"><del><strong>EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span class="inserted"><ins><em>user's
file system for music files, copies them</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would require circumventing the iOS DRM.</p></strong></del></span>
<span class="inserted"><ins><em>an Apple server,
+ and deletes them</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
+
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201602050">
+ <p>iOS version 9 for iThings <a
+
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism from</em></ins></span> the <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
+ Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>uses DRM software to prevent
people</strong></del></span> <span class="inserted"><ins><em>eventually backed
off from this policy under
+ criticism</em></ins></span> from <span
class="removed"><del><strong>charging an iThing with a
+ generic USB cable</a>.</p></li>
+
+ <li><p><a
+
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
+ DRM (digital restrictions mechanisms) in MacOS</a>. This article
+ focuses on</strong></del></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>users. However, it has not
acknowledged</em></ins></span> that <span class="removed"><del><strong>a new
model</strong></del></span> <span class="inserted"><ins><em>this
was wrong.</p>
</li>
<li id="M201510020">
- <p>Apple forced millions of</em></ins></span> iThings <span
class="removed"><del><strong>use</strong></del></span> to <span
class="removed"><del><strong>lock up</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Apple forced millions</em></ins></span> of <span
class="removed"><del><strong>Macbook introduced a requirement
+ for monitors</strong></del></span> <span
class="inserted"><ins><em>iThings</em></ins></span> to <span
class="removed"><del><strong>have malicious hardware,</strong></del></span>
<span class="inserted"><ins><em><a
href="https://discussions.apple.com/thread/7256669?tstart=0">download
- a system upgrade without asking</em></ins></span> the <span
class="removed"><del><strong>user.</p>
-
-<p>Curiously,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</em></ins></span> Apple <span
class="removed"><del><strong>is beginning to allow limited passage
through</strong></del></span> <span class="inserted"><ins><em>did not
- forcibly install</em></ins></span> the
-<span class="removed"><del><strong>walls</strong></del></span> <span
class="inserted"><ins><em>upgrade but the downloading alone caused
lots</em></ins></span>
- of <span class="inserted"><ins><em>trouble.</p>
+ a system upgrade without asking the users</a>. Apple did not
+ forcibly install the upgrade</em></ins></span> but <span
class="removed"><del><strong>DRM software in MacOS is
+ involved in activating</strong></del></span> the <span
class="removed"><del><strong>hardware. The software for accessing iTunes
+ is also responsible.</p></strong></del></span> <span
class="inserted"><ins><em>downloading alone caused lots
+ of trouble.</p></em></ins></span>
</li>
- <li id="M201412040">
+ <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201412040">
<p>Apple <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods</em></ins></span> the <span
class="removed"><del><strong>iThing jail:</strong></del></span> <span
class="inserted"><ins><em>music that</em></ins></span> users <span
class="removed"><del><strong>can now install apps built</strong></del></span>
<span class="inserted"><ins><em>had got</em></ins></span> from
-<span class="removed"><del><strong>source code, provided the source code is
written in Swift. Users
-cannot do</strong></del></span> <span class="inserted"><ins><em>internet music
- stores that competed with iTunes</a>.</p>
+ deleted from iPods the music</em></ins></span> that <span
class="removed"><del><strong>caters to Bluray disks</a>. (The article
focused on Windows
+ and said</strong></del></span> <span class="inserted"><ins><em>users had got
from internet music
+ stores</em></ins></span> that <span class="removed"><del><strong>MacOS
would do the same thing
subsequently.)</p></li></strong></del></span> <span
class="inserted"><ins><em>competed with iTunes</a>.</p>
</li>
<li id="M200709270">
@@ -874,19 +862,55 @@
An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All</em></ins></span> this <span
class="removed"><del><strong>freely because they are
required</strong></del></span> <span class="inserted"><ins><em>was apparently
intentional.</p>
- </li>
+ censorship</a>. All this was apparently intentional.</p>
+ </li></em></ins></span>
</ul>
-<h3 id="surveillance">Apple Surveillance</h3>
+<h3 <span class="removed"><del><strong>id="jails">Apple Jails</h3>
+
+<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
+iOS,</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="removed"><del><strong>operating system
of</strong></del></span> <span class="inserted"><ins><em>Great Nation”
app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to</em></ins></span> the <span class="removed"><del><strong>Apple
iThings, is</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
+ internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>prototype
+of a jail</a>. It</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span> was <span
class="removed"><del><strong>Apple that introduced</strong></del></span> <span
class="inserted"><ins><em>found to contain a
+ back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="removed"><del><strong>practice of
+designing general purpose computers with censorship of application
+programs.</p>
+
+<p>Here</strong></del></span> <span class="inserted"><ins><em>users'
+ phone, as “superusers.”(1) Downloading and using this
+ app</em></ins></span> is <span class="removed"><del><strong>an article
about the</strong></del></span> <span class="inserted"><ins><em>mandatory at
some workplaces.</p>
+
+ <p>(1) The</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a> that</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>iThings use to lock up</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that</em></ins></span> the <span
class="removed"><del><strong>user.</p>
+
+<p>Curiously, Apple is beginning to allow limited passage
through</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on</em></ins></span> the
+<span class="removed"><del><strong>walls</strong></del></span>
+ <span class="inserted"><ins><em>Android version</em></ins></span> of the
<span class="removed"><del><strong>iThing jail: users can now
install</strong></del></span> <span class="inserted"><ins><em>app, and that,
according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201905280">
- <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>identify
-themselves. <a
href="https://developer.apple.com/xcode/">Here</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone apps contain trackers
that</em></ins></span> are <span
class="removed"><del><strong>details</a>. While this is a crack
in</strong></del></span> <span class="inserted"><ins><em>busy at night <a
-
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>built from
+source code, provided the source code is written in Swift. Users
+cannot do this freely because they</strong></del></span> <span
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span
class="removed"><del><strong>required to identify
+themselves.</strong></del></span> <span class="inserted"><ins><em>busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.apple.com/xcode/">Here
+are details</a>. While this is a crack in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
@@ -1158,11 +1182,11 @@
</ul>
-<h3 id="tyrants">Apple Tyrants</h3>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
+<h3 <span class="removed"><del><strong>id="tyrants">Apple
Tyrants</h3>
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>id="tyrants">Tyrants</h3>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -1254,7 +1278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- malware-apple.de.po 16 Oct 2019 07:30:04 -0000 1.144
+++ malware-apple.de.po 19 Oct 2019 10:01:30 -0000 1.145
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -182,7 +182,10 @@
"vom Hersteller âautorisierteâ Betriebssystem zurückweisen."
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+# | [-Apple-]Back Doors
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr "Hintertüren"
#. type: Content of: <ul><li><p>
@@ -264,7 +267,10 @@
"\" class=\"transnote\">[2]</a>"
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Zensur"
#. type: Content of: <p>
@@ -286,8 +292,8 @@
"Informationen siehe den Abschnitt <a href=\"#jails\">Gefängnisse</a>."
#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM"
+msgid "DRM"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -354,7 +360,10 @@
"gekauften Mediendateien abspielt</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Inkompatibilität"
#. type: Content of: <p>
@@ -428,7 +437,10 @@
"Aufbewahrung von Dokumenten als ungeeignet</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Unsicherheit"
#. type: Content of: <p>
@@ -531,7 +543,10 @@
"der Mobilfunksoftware von Mobiltelefonen</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Interferenz"
#. type: Content of: <p>
@@ -556,7 +571,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Gefängnisse"
#. type: Content of: <p>
@@ -857,10 +875,10 @@
"der App selbst zensiert</a> wurde."
#. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
#, fuzzy
#| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Täuschung"
#. type: Content of: <ul><li><p>
@@ -890,7 +908,10 @@
# Handlungszwang?
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Zwang"
#. type: Content of: <p>
@@ -917,7 +938,10 @@
"man nicht Abonnent des Musikstreaming-Dienstes Apple Music ist."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotage"
#. type: Content of: <p>
@@ -1190,11 +1214,39 @@
"Applikationen. Scheinbar war das alles beabsichtigt."
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+# | [-Apple-]Surveillance
+#, fuzzy
+#| msgid "Apple Surveillance"
+msgid "Surveillance"
msgstr "Ãberwachung"
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1679,7 +1731,10 @@
"Apps gratis sind</a>)."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tyrannen"
#. type: Content of: <ul><li><p>
@@ -1829,6 +1884,9 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
+
#~ msgid ""
#~ "Apple <a href=\"https://web.archive.org/web/20160608183145/http://www."
#~ "theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\"> stops "
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- malware-apple.es.po 16 Oct 2019 11:10:25 -0000 1.167
+++ malware-apple.es.po 19 Oct 2019 10:01:30 -0000 1.168
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -153,7 +154,7 @@
"sistema operativo que no esté «autorizado» por el fabricante."
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr "Puertas traseras"
#. type: Content of: <ul><li><p>
@@ -226,7 +227,10 @@
"poder porque podemos confiar en Apple, sin lugar a dudas."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Censura"
#. type: Content of: <p>
@@ -240,8 +244,8 @@
"<a href=\"#jails\">Prisiones de Apple</a>."
#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Gestión digital de restricciones"
+msgid "DRM"
+msgstr "DRM"
#. type: Content of: <ul><li><p>
msgid ""
@@ -310,7 +314,10 @@
"vÃdeos que han adquirido</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Incompatibilidad"
#. type: Content of: <p>
@@ -381,7 +388,10 @@
"api=v2\">inapropiados para la conservación de documentos</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Falta de seguridad"
#. type: Content of: <p>
@@ -468,7 +478,10 @@
"\">multitud de agujeros en el software de radio de los teléfonos</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Interferencia de Apple"
#. type: Content of: <p>
@@ -497,7 +510,10 @@
"otras que no sean de Apple</a>."
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Prisiones"
#. type: Content of: <p>
@@ -803,7 +819,10 @@
"estaba censurando debido al asunto del que trataba</a>."
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Manipulación"
#. type: Content of: <ul><li><p>
@@ -828,7 +847,10 @@
"opción», pero en realidad serán muy pocos los que puedan hacerlo."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Presiones"
#. type: Content of: <p>
@@ -853,7 +875,10 @@
"Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotaje"
#. type: Content of: <p>
@@ -1053,11 +1078,36 @@
"aprueba. Al parecer, todo esto fue intencionado."
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
msgstr "Vigilancia"
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1401,7 +1451,10 @@
"y recibir el código que Apple le envÃa."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tiranos"
#. type: Content of: <ul><li><p>
@@ -1499,6 +1552,9 @@
msgid "Updated:"
msgstr "Ãltima actualización:"
+#~ msgid "Apple DRM"
+#~ msgstr "Gestión digital de restricciones"
+
#~ msgid ""
#~ "It cited a bizarre excuse, but the real reason is surely, “China "
#~ "ordered us to ban it.”"
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- malware-apple.fr.po 16 Oct 2019 10:47:18 -0000 1.174
+++ malware-apple.fr.po 19 Oct 2019 10:01:30 -0000 1.175
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-10-16 12:46+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -151,7 +152,7 @@
"d'exploitation non « autorisé » par le fabricant."
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr "Portes dérobées"
#. type: Content of: <ul><li><p>
@@ -226,7 +227,10 @@
"possède ce pouvoir, car naturellement nous pouvons lui faire confiance."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Censure"
#. type: Content of: <p>
@@ -240,7 +244,7 @@
"vous à la section <a href=\"#jails\">Prisons</a>."
#. type: Content of: <h3>
-msgid "Apple DRM"
+msgid "DRM"
msgstr "DRM"
#. type: Content of: <ul><li><p>
@@ -310,7 +314,10 @@
"vidéos qu'ils ont achetées</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Incompatibilité"
#. type: Content of: <p>
@@ -380,7 +387,10 @@
"api=v2\">impropres à la conservation des documents</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Insécurité"
#. type: Content of: <p>
@@ -469,7 +479,10 @@
"bogues dans le logiciel de radio des téléphones</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Ingérence"
#. type: Content of: <p>
@@ -498,7 +511,10 @@
"par des tiers</a>."
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Prisons"
#. type: Content of: <p>
@@ -802,7 +818,10 @@
"censurée à cause de son thème</a>."
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Manipulation"
#. type: Content of: <ul><li><p>
@@ -828,7 +847,10 @@
"comprendront comment le faire."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Pression sur le client"
#. type: Content of: <p>
@@ -853,7 +875,10 @@
"sur la popularité des chansons si vous n'êtes pas abonné à Apple Miusic."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotage"
#. type: Content of: <p>
@@ -1055,11 +1080,36 @@
"html\">censure d'Apple</a>. Tout ceci était apparemment intentionnel."
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
msgstr "Surveillance"
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1405,7 +1455,10 @@
"et recevoir le code de vérification envoyé dessus par Apple."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tyrans"
#. type: Content of: <ul><li><p>
@@ -1502,3 +1555,6 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid "Apple DRM"
+#~ msgstr "DRM"
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-apple.it-diff.html 16 Oct 2019 07:30:04 -0000 1.57
+++ malware-apple.it-diff.html 19 Oct 2019 10:01:30 -0000 1.58
@@ -86,7 +86,7 @@
</ul>
</div>
-<h3 id="back-doors">Apple Back Doors</h3>
+<h3 <span class="removed"><del><strong>id="back-doors">Apple
Back</strong></del></span> <span
class="inserted"><ins><em>id="back-doors">Back</em></ins></span>
Doors</h3>
<span class="removed"><del><strong><ul>
<li><p>
Mac</strong></del></span>
@@ -144,10 +144,10 @@
</ul>
-<h3 id="censorship">Apple Censorship</h3>
-<span class="removed"><del><strong><ul>
+<h3 <span class="removed"><del><strong>id="censorship">Apple
Censorship</h3>
+<ul>
-<li></strong></del></span>
+<li></strong></del></span> <span
class="inserted"><ins><em>id="censorship">Censorship</h3></em></ins></span>
<p>Apple <span class="removed"><del><strong><a
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
@@ -163,7 +163,7 @@
section for more information.</p>
-<h3 id="drm">Apple DRM</h3>
+<h3 id="drm">DRM</h3>
<ul class="blurbs">
<li id="M201908150.1">
@@ -182,7 +182,8 @@
<li id="M201704070.1">
<p>DRM makes</em></ins></span> the <span
class="removed"><del><strong>LinkedIn app in Russia</a>.</p>
-<p>This is ironic because LinkedIn is a
surveillance</strong></del></span> <span class="inserted"><ins><em>iPhone 7
nearly <a
+<p>This is ironic because LinkedIn is a surveillance system
+itself.</strong></del></span> <span class="inserted"><ins><em>iPhone 7 nearly
<a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
</li>
@@ -217,7 +218,7 @@
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 id="incompatibility">Incompatibility</h3>
<p>In this section, we list characteristics of Apple programs that block
or
hinder users from switching to any alternative program—and, in
@@ -258,7 +259,7 @@
</ul>
-<h3 id="insecurity">Apple Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -307,7 +308,7 @@
</ul>
-<h3 id="interference">Apple Interference</h3>
+<h3 id="interference">Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify for the
word “sabotage”. Nonetheless, they are nasty and
@@ -325,7 +326,7 @@
</ul>
-<h3 id="jails">Apple Jails</h3>
+<h3 id="jails">Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS, the operating system of the Apple iThings, is the prototype
@@ -404,7 +405,7 @@
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
- <p>This is ironic because LinkedIn is a
surveillance</em></ins></span> system itself.
+ <p>This is ironic because LinkedIn is a surveillance system
itself.</em></ins></span>
While subjecting its users to its own surveillance, it tries to
protect its users from Russian surveillance, and is therefore subject
to Russian censorship.</p>
@@ -413,26 +414,36 @@
apps.</p>
</li>
-<span class="removed"><del><strong><li><p></strong></del></span>
+<span class="removed"><del><strong><li><p>
+Apple</strong></del></span>
<span class="inserted"><ins><em><li id="M201701050">
- <p>Apple used its censorship system to enforce China's censorship
<a
-
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of the New York Times app</a>.</p>
+ <p>Apple</em></ins></span> used its censorship system to enforce
China's censorship <a <span
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
+ by</em></ins></span> blocking distribution of the New York Times <span
class="removed"><del><strong>app</a>.</p></li>
+
+<li><p>
+Apple</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
</li>
<li id="M201605190">
- <p>Apple censors games, <a
-
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning some games from the cr…app store</a> because of which
+ <p>Apple</em></ins></span> censors games, <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning</em></ins></span> some games from the cr…app
store</a> because of which
political points they suggest. Some political points are apparently
considered acceptable.</p>
</li>
- <li id="M201509290">
- <p>Apple <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+<span class="removed"><del><strong><li><p>
+Apple</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509290">
+ <p>Apple</em></ins></span> <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
- committed the enormity of disassembling some iThings.</p>
+ committed the enormity of disassembling some <span
class="removed"><del><strong>iThings.
+</p></li>
+
+<li><p></strong></del></span> <span
class="inserted"><ins><em>iThings.</p>
</li>
<li id="M201509230">
@@ -458,7 +469,7 @@
not be allowed to censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue.</em></ins></span> Apple <span
class="inserted"><ins><em>should not have the power to impose its views
+ the real issue. Apple should not have the power to impose its views
about either of these questions, or any other.</p>
</li>
@@ -469,28 +480,11 @@
</li>
<li id="M201405250">
- <p>Apple</em></ins></span> used <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> censorship <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>power in 2014</em></ins></span> to <span
class="removed"><del><strong>enforce
-China's censorship <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
-blocking distribution of the New York Times app</a>.</p></li>
-
-<li><p>
-Apple censors
-games,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
-some games from</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>cr…app store</a> because of which
political
-points they suggest. Some political points are apparently considered
-acceptable.</p>
-</li>
-
-<li><p>
-Apple</strong></del></span> <span class="inserted"><ins><em>iThings for a
time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"></em></ins></span>
- banned a <span class="removed"><del><strong>program from the App
Store</a> because its developers
-committed the enormity of disassembling some iThings.
-</p></li>
-
-<li><p></strong></del></span> <span class="inserted"><ins><em>game
about growing marijuana</a>, while permitting games
+ <p>Apple used this censorship power in 2014 to <a
+
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ ban all bitcoin apps</a> for the iThings for a time. It also <a
+
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps</em></ins></span>
Apple <span class="inserted"><ins><em>considers
killing more acceptable than marijuana.</p>
</li>
@@ -505,103 +499,66 @@
</p></li>
<li><p>
-As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
-rights or would help women find abortions</a>.</p>
-
-<p>
-This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
-affects other Apple services</a>.
-</p></li>
-</ul>
-
-<h3 id="insecurity">Apple Insecurity</h3>
-
-<p>These bugs are/were not intentional, so unlike the rest of the file
- they do not count as malware. We mention them to refute the
- supposition that prestigious proprietary software doesn't have grave
- bugs.</p>
-
-<ul>
- <li>
- <p>A vulnerability in Apple's Image I/O API allowed an attacker
- to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses this API to render
- a certain kind of image file</a>.</p>
- </li>
-
- <li>
- <p>A bug in the iThings Messages
- app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all the user's messaging
history</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>matter</a>.</p></em></ins></span>
+As of 2015, Apple</strong></del></span> <span
class="inserted"><ins><em>matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they</strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Apple Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns”</em></ins></span> are <span
class="removed"><del><strong>not grave enough</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed</em></ins></span> to <span
class="removed"><del><strong>qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
-interference.</p>
+ <p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed to mislead users,</em></ins></span> or <span
class="removed"><del><strong>would help women find
abortions</a>.</p>
-<ul>
- <li><p>Apple forced millions of iThings</strong></del></span>
<span class="inserted"><ins><em>mislead users, or make option settings
hard</em></ins></span>
- to <span class="removed"><del><strong>download a system upgrade
- <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.</strong></del></span> <span
class="inserted"><ins><em>find</a>.</p>
+<p></strong></del></span> <span class="inserted"><ins><em>make option
settings hard
+ to find</a>.</p>
- <p>This allows a company such as</em></ins></span> Apple <span
class="removed"><del><strong>did not forcibly install the upgrade but the
downloading alone caused lots of trouble.</p></strong></del></span> <span
class="inserted"><ins><em>to say, “We allow users
+ <p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
+<h3 id="pressuring">Pressuring</h3>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software.</em></ins></span> This
<span class="removed"><del><strong>particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects</strong></del></span> <span class="inserted"><ins><em>section reports
examples of hard sell and</em></ins></span> other <span
class="inserted"><ins><em>unjust commercial tactics by Apple.</p>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201510270">
- <p>Apple</em></ins></span> Siri <a
+ <p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
- to give you information</a> about music charts if you're not an Apple
- Music subscriber.</p>
- </li>
+ to give you information</a> about music charts if you're not
an</em></ins></span> Apple <span
class="removed"><del><strong>services</a>.
+</p></li></strong></del></span>
+ <span class="inserted"><ins><em>Music subscriber.</p>
+ </li></em></ins></span>
</ul>
-<h3 id="sabotage">Apple Sabotage</h3>
+<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3></strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Sabotage</h3></em></ins></span>
-<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
-
-<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span
class="inserted"><ins><em>them or block their work.</p>
+<p>These <span class="removed"><del><strong>bugs are/were not
intentional, so unlike the rest</strong></del></span> <span
class="inserted"><ins><em>are situations in which Apple employs its power over
users
+to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects a user of fraud, it
- judges the case secretly and presents the verdict
- as a fait accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
+ <p>When Apple suspects a user</em></ins></span> of <span
class="inserted"><ins><em>fraud, it
+ judges</em></ins></span> the <span class="removed"><del><strong>file
+ they</strong></del></span> <span class="inserted"><ins><em>case secretly and
presents the verdict
+ as a fait accompli. The punishment to a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off for life, which more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>user's Apple
+ being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
+ the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
@@ -610,16 +567,13 @@
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span class="inserted"><ins><em>to block
+ <p>This evidently has to</em></ins></span> do <span
class="inserted"><ins><em>with Russia's command to Apple to block
Telegram in Russia.</p>
- <p>The Telegram client is free software on other platforms, but not
on
+ <p>The Telegram client is free software on other platforms,
but</em></ins></span> not <span class="removed"><del><strong>count as malware.
We mention them</strong></del></span> <span class="inserted"><ins><em>on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be
free</em></ins></span> software.</p>
-
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em></li>
+ are jails</a>, they don't permit any app</em></ins></span> to <span
class="removed"><del><strong>refute</strong></del></span> <span
class="inserted"><ins><em>be free software.</p>
+ </li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
@@ -628,35 +582,46 @@
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
- <li id="M201706060"></em></ins></span>
+ <li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
- </li>
+ that's</em></ins></span> the
+ <span class="removed"><del><strong>supposition that
prestigious</strong></del></span> <span class="inserted"><ins><em>nature
of</em></ins></span> proprietary <span class="removed"><del><strong>software
doesn't have grave
+ bugs.</p>
- <span class="removed"><del><strong><li>
- <p>The</strong></del></span>
+<ul>
+ <li>
+ <p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span
class="inserted"><ins><em>software.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201704070">
- <p id="iphone7-sabotage">The</em></ins></span>
- iPhone 7 contains DRM specifically designed to <a
- <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"></em></ins></span>
+ <li id="M201704070">
+ <p id="iphone7-sabotage">The
+ iPhone 7 contains DRM specifically designed</em></ins></span> to <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses the term “lock”
- to describe the DRM, but we prefer to use the term <a
- <span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital
- handcuffs</a>.</p>
+ <p>The article</em></ins></span> uses <span
class="removed"><del><strong>this API</strong></del></span> <span
class="inserted"><ins><em>the term “lock”</em></ins></span>
+ to <span class="removed"><del><strong>render
+ a certain kind of image file</a>.</p>
</li>
+ <li>
+ <p>A bug in</strong></del></span> <span
class="inserted"><ins><em>describe</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+ a malicious web site</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>term <a
+ href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+ handcuffs</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li></strong></del></span>
+<h3 id="interference">Apple Interference</h3>
+<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em><li id="M201606080">
<p>Apple <a
@@ -665,112 +630,182 @@
while refusing to fix them itself.</p>
</li>
- <li id="M201605040"></em></ins></span>
- <p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
- the user's file system for music files, copies them to an Apple server,
+ <li id="M201605040">
+ <p>The Apple Music client program <a
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ the user's <span class="removed"><del><strong>system. They are like
sabotage, but they are not grave enough</strong></del></span> <span
class="inserted"><ins><em>file system for music files, copies
them</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>an Apple server,
and deletes them</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Apple <a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops users from fixing the security bugs in Quicktime for
- Windows</a>, while refusing to fix them itself.</p>
- </li>
-
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201602050"></em></ins></span>
- <p>iOS version 9 for iThings <a
+ <li id="M201602050">
+ <p>iOS version 9</em></ins></span> for <span
class="removed"><del><strong>the word “sabotage”.
Nonetheless,</strong></del></span> <span class="inserted"><ins><em>iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
- them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism from the <span class="removed"><del><strong>users. However, it
has not acknowledged</strong></del></span> <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
+ them irreparably if</em></ins></span> they <span
class="removed"><del><strong>are nasty and wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>were repaired
by someone other than
+ Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>eventually backed off from this policy under
+ criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
<li id="M201510020">
- <p>Apple forced millions of iThings to <a
- href="https://discussions.apple.com/thread/7256669?tstart=0">download
- a system upgrade without asking the users</a>. Apple did not
- forcibly install the upgrade but the downloading alone caused lots
+ <p>Apple</em></ins></span> forced millions of iThings to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://discussions.apple.com/thread/7256669?tstart=0">download</em></ins></span>
+ a system upgrade
+ <span class="removed"><del><strong><a
href="https://discussions.apple.com/thread/7256669?tstart0=">without</strong></del></span>
<span class="inserted"><ins><em>without</em></ins></span> asking the
users</a>. Apple did not
+ forcibly install the upgrade but the <span
class="removed"><del><strong>downloading alone caused lots of trouble.</p>
+ </li>
+</ul>
+
+<h3 id="pressuring">Apple Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri</strong></del></span> <span
class="inserted"><ins><em>downloading alone caused lots
of trouble.</p>
</li>
<li id="M201412040">
- <p>Apple <a
-
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music</em></ins></span> that
- <span class="removed"><del><strong>this was
wrong.</p></strong></del></span> <span class="inserted"><ins><em>users
had got from internet music
- stores that competed with iTunes</a>.</p></em></ins></span>
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
+ about</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the</em></ins></span> music <span
class="removed"><del><strong>charts if you're not an</strong></del></span>
<span class="inserted"><ins><em>that users had got from internet music
+ stores that competed with iTunes</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200709270">
+ <li id="M200709270">
<p><a
-
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></em></ins></span>
- An Apple firmware “upgrade” bricked iPhones that had been
- <span class="removed"><del><strong>unlocked.</a></strong></del></span>
- <span class="inserted"><ins><em>unlocked</a>.</em></ins></span> The
“upgrade” also deactivated applications
+
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An</em></ins></span> Apple <span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
+ unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently intentional.</p>
+ censorship</a>. All this was apparently
intentional.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
- </li></strong></del></span>
</ul>
-<h3 id="surveillance">Apple Surveillance</h3>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
+<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3></strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+<ul class="blurbs">
+ <li id="M201910130"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>wrongs</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
+ phone, as “superusers.”(1) Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
+not involve making</strong></del></span>
+ <span class="inserted"><ins><em>app is mandatory at some
workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
+ but readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way that hurts the user.
+But they are</strong></del></span> <span class="inserted"><ins><em>text
editor) includes</em></ins></span> a <span class="removed"><del><strong>lot
like malware, since they are technical Apple
+actions</strong></del></span>
+ <span class="inserted"><ins><em>clarification saying</em></ins></span>
that <span class="removed"><del><strong>harm to</strong></del></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the
+ Android version</em></ins></span> of <span
class="removed"><del><strong>specific Apple software.</p>
+
+<ul>
+ <li>
+ <p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
+ model iThings</a>.</p>
+
+ <p>Meanwhile, Apple stops people from fixing problems themselves;
+ that's</strong></del></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>app, and that, according to Apple, “this
+ kind</em></ins></span> of <span class="removed"><del><strong>proprietary
software.</p></strong></del></span> <span
class="inserted"><ins><em>‘superuser’ surveillance could not be
conducted
+ on Apple's operating system.”</p></em></ins></span>
+ </li>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <span class="removed"><del><strong><li>
+ <p>The iPhone 7 contains DRM specifically
designed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
+ <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that
are busy at night</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+ brick it if an “unauthorized” repair shop fixes it</a>.
+ “Unauthorized” essentially means anyone besides
Apple.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information to third
parties</a>.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>uses the term
“lock” to describe</strong></del></span> <span
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>DRM,
+ but we prefer to use</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>term <a
+ href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
+ digital handcuffs</a>.</p></strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
is collected by the company, there is no telling what it will be
- used for.</p>
+ used for.</p></em></ins></span>
</li>
- <li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS, <a
-
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
- the user's browsing history</a>.</p>
+
+ <span class="removed"><del><strong><li>
+ <p>The Apple Music client
+ program</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809070">
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
+ the user's <span class="removed"><del><strong>file system for music files,
copies them to an Apple
+ server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>browsing
history</a>.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
+ <span class="removed"><del><strong><li>
+ <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+stops users from fixing</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>security bugs in Quicktime for
+ Windows</a>, while refusing</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ illegal</em></ins></span> to <span class="removed"><del><strong>fix them
itself.</p></strong></del></span> <span class="inserted"><ins><em>study
how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>iOS version 9 for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest</em></ins></span> iThings <span
class="inserted"><ins><em>system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn</em></ins></span> them <span
class="removed"><del><strong>irreparably if they were repaired by someone other
than
+ Apple</a>. Apple eventually backed off from this policy under
+ criticism from the users. However, it has not acknowledged that
+ this was wrong.</p>
</li>
- <li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An</strong></del></span> <span class="inserted"><ins><em>off</a>. A
more advanced way really does turn
+ them off—only until 5am. That's</em></ins></span> Apple <span
class="removed"><del><strong>firmware “upgrade” bricked iPhones
that had been
+ unlocked.</a> The “upgrade” also deactivated applications
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently intentional.</p>
+ </li>
+
+ <li><p>Apple
+ <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
+ stores that competed with iTunes</a>.</p></strong></del></span>
<span class="inserted"><ins><em>for you—“We
+ know you want to be spied on”.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
+ <li><p>Apple</strong></del></span>
- <li id="M201702150">
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple</em></ins></span> proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
@@ -856,11 +891,11 @@
<span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201410300">
- <p> MacOS automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ <p> MacOS automatically <a
+
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
sends to Apple servers unsaved documents being edited</a>. The
- things you have not decided to save are <a
-
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
+ things you have not decided to save are</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
even more sensitive</a> than</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p>
</li>
@@ -1023,11 +1058,11 @@
</ul>
-<h3 id="tyrants">Apple Tyrants</h3>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
+<h3 <span class="removed"><del><strong>id="tyrants">Apple
Tyrants</h3>
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>id="tyrants">Tyrants</h3>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -1119,7 +1154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-apple.it.po 16 Oct 2019 07:30:04 -0000 1.138
+++ malware-apple.it.po 19 Oct 2019 10:01:30 -0000 1.139
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -173,7 +173,10 @@
"di sistemi operativi non âautorizzatiâ dal produttore."
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+# | [-Apple-]Back Doors
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr "Backdoor di Apple"
#. type: Content of: <ul><li><p>
@@ -262,7 +265,10 @@
"potere perché di Apple ci si può fidare, eccome."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Censura di Apple"
#. type: Content of: <p>
@@ -273,8 +279,8 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "DRM di Apple"
+msgid "DRM"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -343,10 +349,10 @@
msgstr ""
#. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
#, fuzzy
#| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Mancata sicurezza di Apple"
#. type: Content of: <p>
@@ -393,7 +399,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Mancata sicurezza di Apple"
#. type: Content of: <p>
@@ -500,7 +509,10 @@
"programmi di radiocomunicazione dei telefoni</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Interferenza di Apple"
#. type: Content of: <p>
@@ -524,7 +536,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Prigioni di Apple"
#. type: Content of: <p>
@@ -918,10 +933,10 @@
"drone-strikes/\">solo per il tema di cui trattava</a>."
#. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
+# | [-Apple Deception-]{+Manipulation+}
#, fuzzy
#| msgid "Apple Deception"
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Inganni di Apple"
#. type: Content of: <ul><li><p>
@@ -947,7 +962,10 @@
"come farlo."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Pressioni di Apple"
#. type: Content of: <p>
@@ -972,7 +990,10 @@
"classifiche musicali se non siete iscritti ad Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Sabotaggio di Apple"
#. type: Content of: <p>
@@ -1217,11 +1238,39 @@
"Tutto questo era apparentemente intenzionale."
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+# | [-Apple-]Surveillance
+#, fuzzy
+#| msgid "Apple Surveillance"
+msgid "Surveillance"
msgstr "Sorveglianza di Apple"
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1646,7 +1695,10 @@
"che Apple invia a tale indirizzo."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Tiranni di Apple"
#. type: Content of: <ul><li><p>
@@ -1781,6 +1833,9 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#~ msgid "Apple DRM"
+#~ msgstr "DRM di Apple"
+
#~ msgid ""
#~ "<a href=\"http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-"
#~ "think-yo.html\"> iOS, the operating system of the Apple iThings, is a "
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-apple.ja-diff.html 16 Oct 2019 07:30:04 -0000 1.70
+++ malware-apple.ja-diff.html 19 Oct 2019 10:01:30 -0000 1.71
@@ -96,7 +96,7 @@
</div>
<span class="removed"><del><strong></div></strong></del></span>
-<h3 id="back-doors">Apple Back Doors</h3>
+<h3 <span class="removed"><del><strong>id="back-doors">Apple
Back</strong></del></span> <span
class="inserted"><ins><em>id="back-doors">Back</em></ins></span>
Doors</h3>
<span class="removed"><del><strong><ul>
<li><p>
Mac</strong></del></span>
@@ -154,45 +154,57 @@
</ul>
-<h3 id="censorship">Apple Censorship</h3>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
+<h3 <span class="removed"><del><strong>id="censorship">Apple
Censorship</h3>
+<ul>
+<li><p>
+Apple censors
+games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from the cr…app store</a> because
of</strong></del></span> <span
class="inserted"><ins><em>id="censorship">Censorship</h3>
+
+<p>Apple mainly uses iOS,</em></ins></span> which <span
class="removed"><del><strong>political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> a <span
class="removed"><del><strong>program from the App Store</a> because its
developers
+committed the enormity of disassembling some iThings.
+</p></li>
-<span class="inserted"><ins><em><p>Apple mainly uses iOS, which is a
typical jail, to impose censorship
-through the</em></ins></span> Apple <span class="removed"><del><strong>censors
-games,</strong></del></span> <span class="inserted"><ins><em>Store. Please
refer to the</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
-some games from</strong></del></span> <span
class="inserted"><ins><em>href="#jails">Apple Jails</a>
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time</strong></del></span> <span
class="inserted"><ins><em>typical jail, to impose censorship
+through</em></ins></span> the <span class="removed"><del><strong>developers
+fixed one “problem”,</strong></del></span> Apple <span
class="removed"><del><strong>complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>Store. Please
refer to</em></ins></span> the <span class="removed"><del><strong>fifth
rejection,
+Apple</strong></del></span> <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based</strong></del></span> <span
class="inserted"><ins><em>href="#jails">Apple Jails</a>
section for more information.</p>
-<h3 id="drm">Apple DRM</h3>
+<h3 id="drm">DRM</h3>
<ul class="blurbs">
<li id="M201908150.1">
- <p>Apple is putting DRM on iPhone batteries, and</em></ins></span>
the <span class="removed"><del><strong>cr…app store</a> because of
which political
-points they suggest. Some political points</strong></del></span> <span
class="inserted"><ins><em>system proprietary
- software <a href="#M201908150">turns off certain features when
batteries</em></ins></span>
- are <span class="removed"><del><strong>apparently considered
-acceptable.</p></strong></del></span> <span
class="inserted"><ins><em>replaced other than by
Apple.</a></p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li><p>
-Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
-banned a program from the App Store</a> because its developers
-committed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704070.1">
- <p>DRM makes</em></ins></span> the <span
class="removed"><del><strong>enormity of disassembling some iThings.
+ <p>Apple is putting DRM</em></ins></span> on <span
class="inserted"><ins><em>iPhone batteries, and</em></ins></span> the <span
class="removed"><del><strong>subject matter</a>.
</p></li>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>iPhone 7 nearly <a
+<li><p>
+As</strong></del></span> <span class="inserted"><ins><em>system proprietary
+ software <a href="#M201908150">turns off certain features when
batteries
+ are replaced other than by Apple.</a></p>
+ </li>
+
+ <li id="M201704070.1">
+ <p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
</li>
<li id="M201512260">
<p><a
-
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"></em></ins></span>
- Apple <span class="removed"><del><strong>rejected</strong></del></span>
<span class="inserted"><ins><em>uses DRM software to prevent people from
charging</em></ins></span> an <span class="removed"><del><strong>app that
displayed the locations of</strong></del></span> <span
class="inserted"><ins><em>iThing
+
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
+ Apple uses DRM software to prevent people from charging an iThing
with a generic USB cable</a>.</p>
</li>
@@ -220,7 +232,7 @@
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 id="incompatibility">Incompatibility</h3>
<p>In this section, we list characteristics of Apple programs that block
or
hinder users from switching to any alternative program—and, in
@@ -261,7 +273,7 @@
</ul>
-<h3 id="insecurity">Apple Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -310,7 +322,7 @@
</ul>
-<h3 id="interference">Apple Interference</h3>
+<h3 id="interference">Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify for the
word “sabotage”. Nonetheless, they are nasty and
@@ -328,7 +340,7 @@
</ul>
-<h3 id="jails">Apple Jails</h3>
+<h3 id="jails">Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS, the operating system of the Apple iThings, is the prototype
@@ -437,14 +449,18 @@
</li>
<li id="M201509230">
- <p>As of 2015, Apple <a
-
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically bans apps that endorse abortion rights or would help
+ <p>As</em></ins></span> of 2015, Apple <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically</em></ins></span> bans apps that endorse abortion rights or
would help
women find abortions</a>.</p>
- <p>This particular political slant <a
+<span class="removed"><del><strong><p>
+This</strong></del></span>
+
+ <span class="inserted"><ins><em><p>This</em></ins></span> particular
political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple services</a>.</p>
+ affects other Apple <span class="removed"><del><strong>services</a>.
+</p></li></strong></del></span> <span
class="inserted"><ins><em>services</a>.</p>
</li>
<li id="M201506250">
@@ -481,233 +497,218 @@
<li id="M201402070">
<p>Apple rejected an app that displayed the locations
- of</em></ins></span> US drone assassinations, giving various excuses. Each
+ of US drone assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection, Apple <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted</em></ins></span> it was censoring the app based on the subject
<span class="removed"><del><strong>matter</a>.
-</p></li>
-
-<li><p>
-As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
-rights or would help women find abortions</a>.</p>
-
-<p>
-This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
-affects other Apple services</a>.
-</p></li>
-</ul>
-
-<h3 id="insecurity">Apple Insecurity</h3>
-
-<ul>
- <li>
- <p>A vulnerability in Apple's Image I/O API allowed an attacker
- to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses this API to render
- a certain kind of image file</a>.</p>
- </li>
-
- <li>
- <p>A bug in the iThings Messages
- app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all the user's messaging
history</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>matter</a>.</p></em></ins></span>
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they</strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Apple Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns”</em></ins></span> are <span
class="removed"><del><strong>not grave enough</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed</em></ins></span> to <span
class="removed"><del><strong>qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of iThings</strong></del></span>
<span class="inserted"><ins><em>mislead users, or make option settings
hard</em></ins></span>
- to <span class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>find</a>.</p>
+ interfaces designed to mislead users, or make option settings hard
+ to find</a>.</p>
- <p>This allows</em></ins></span> a <span
class="removed"><del><strong>system upgrade
- <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.</strong></del></span> <span
class="inserted"><ins><em>company such as</em></ins></span> Apple <span
class="removed"><del><strong>did not forcibly install the upgrade but the
downloading alone caused lots of trouble.</p></strong></del></span> <span
class="inserted"><ins><em>to say, “We allow users
+ <p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 id="pressuring">Apple Pressuring</h3>
+<h3 id="pressuring">Pressuring</h3>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201510270">
- <p>Apple</em></ins></span> Siri <a
+ <p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a> about music charts if you're not an Apple
Music subscriber.</p>
- </li>
+ </li></em></ins></span>
</ul>
-<h3 id="sabotage">Apple Sabotage</h3>
+<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3>
-<span class="removed"><del><strong><p>The wrongs</strong></del></span>
+<ul>
+ <li>
+ <p>A vulnerability</strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Sabotage</h3>
-<span class="inserted"><ins><em><p>These are situations in which Apple
employs its power over users
-to directly intervene</em></ins></span> in <span
class="removed"><del><strong>this section are not precisely malware, since they
do
-not involve making the program</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="removed"><del><strong>runs in</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
+<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application</strong></del></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
+to <span class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>directly intervene in ways that harm them or block
their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>way that hurts</strong></del></span> <span
class="inserted"><ins><em>user of fraud, it
- judges</em></ins></span> the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>case
secretly and presents the verdict
- as</em></ins></span> a <span class="removed"><del><strong>lot like
malware, since they are technical Apple
-actions that harm</strong></del></span> <span class="inserted"><ins><em>fait
accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
+ <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>fraud, it
+ judges the case secretly and presents the verdict
+ as a fait accompli. The punishment to a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off for life, which more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>user's Apple
- devices forever</a>. There is no appeal.</p>
+ being cut off for life, which more-or-less cripples the user's Apple
+ devices forever</a>. There is no appeal.</p></em></ins></span>
</li>
- <li id="M201810240">
+ <span class="removed"><del><strong><li>
+ <p>A bug in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
+ the <span class="removed"><del><strong>iThings Messages
+ app</strong></del></span> <span class="inserted"><ins><em>performance of
older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
- <p>Apple has <a
-
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
-
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span
class="removed"><del><strong>software.</p>
+ <p>Apple has</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
+ Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>malicious web site</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>to block
- Telegram in Russia.</p></em></ins></span>
+ <p>This evidently has</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>do with Russia's command to Apple to block
+ Telegram in Russia.</p>
- <p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
- <span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
- iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
+ <p>The Telegram client is free software on other platforms, but not
on
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ changes</em></ins></span> the <span class="removed"><del><strong>user's
messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201706060">
+<h3 id="interference">Apple Interference</h3>
+<p>Various</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs</em></ins></span> for <span class="removed"><del><strong>music files,
copies them</strong></del></span> <span class="inserted"><ins><em>older model
iThings</a>.</p>
+ bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
+ that's the nature of</em></ins></span> proprietary <span
class="removed"><del><strong>programs often mess up</strong></del></span> <span
class="inserted"><ins><em>software.</p>
</li>
<li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains DRM specifically designed</em></ins></span> to <span
class="inserted"><ins><em><a
+ iPhone 7 contains DRM specifically designed to <a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
- server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>“unauthorized” repair shop fixes
it</a>.
+ brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses the term “lock”
- to describe the DRM, but we prefer to use the term <a
+ <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like
sabotage,</strong></del></span> <span class="inserted"><ins><em>term
“lock”
+ to describe the DRM,</em></ins></span> but <span
class="removed"><del><strong>they are not grave enough</strong></del></span>
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p></em></ins></span>
+ handcuffs</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201606080"></em></ins></span>
+ <li id="M201606080">
<p>Apple <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></em></ins></span>
- stops users from fixing the security bugs in Quicktime for
Windows</a>,
+
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+ stops users from fixing the security bugs in Quicktime</em></ins></span>
for <span class="inserted"><ins><em>Windows</a>,
while refusing to fix them itself.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605040">
+ <li id="M201605040">
<p>The Apple Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
- the user's file system for music files, copies them to an Apple server,
- and deletes them</a>.</p>
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ the <span class="removed"><del><strong>word “sabotage”.
Nonetheless, they are nasty</strong></del></span> <span
class="inserted"><ins><em>user's file system for music files, copies them to an
Apple server,</em></ins></span>
+ and <span class="removed"><del><strong>wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>deletes
them</a>.</p>
</li>
- <li id="M201602050"></em></ins></span>
- <p>iOS version 9 for iThings <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <li id="M201602050">
+ <p>iOS version 9 for iThings <a
+
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
- them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
+ Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>eventually backed off from this policy under
criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
<li id="M201510020">
- <p>Apple forced millions of iThings to <a
- href="https://discussions.apple.com/thread/7256669?tstart=0">download
- a system upgrade without asking the users</a>. Apple did not
+ <p>Apple</em></ins></span> forced millions of iThings to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://discussions.apple.com/thread/7256669?tstart=0">download</em></ins></span>
+ a system upgrade
+ <span class="removed"><del><strong><a
href="https://discussions.apple.com/thread/7256669?tstart0=">without</strong></del></span>
<span class="inserted"><ins><em>without</em></ins></span> asking the
users</a>. Apple did not
forcibly install the upgrade but the downloading alone caused lots
of trouble.</p>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201412040">
- <p>Apple <a
-
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted</em></ins></span> from <span
class="inserted"><ins><em>iPods</em></ins></span> the <span
class="removed"><del><strong>users. However, it has not
acknowledged</strong></del></span> <span
class="inserted"><ins><em>music</em></ins></span> that
- <span class="removed"><del><strong>this was
wrong.</p></strong></del></span> <span class="inserted"><ins><em>users
had got from internet music
- stores that competed with iTunes</a>.</p></em></ins></span>
- </li>
+<h3 id="pressuring">Apple Pressuring</h3>
- <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri</strong></del></span>
- <span class="inserted"><ins><em><li id="M200709270">
+ <span class="inserted"><ins><em><li id="M201412040">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
+ about</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the</em></ins></span> music <span
class="removed"><del><strong>charts if you're not an</strong></del></span>
<span class="inserted"><ins><em>that users had got from internet music
+ stores that competed with iTunes</a>.</p>
+ </li>
+
+ <li id="M200709270">
<p><a
-
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></em></ins></span>
- An Apple firmware “upgrade” bricked iPhones that had been
- <span class="removed"><del><strong>unlocked.</a></strong></del></span>
- <span class="inserted"><ins><em>unlocked</a>.</em></ins></span> The
“upgrade” also deactivated applications
+
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An</em></ins></span> Apple <span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
+ unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently intentional.</p>
+ censorship</a>. All this was apparently
intentional.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
- </li></strong></del></span>
</ul>
-<h3 id="surveillance">Apple Surveillance</h3>
-<span class="removed"><del><strong><ul>
- <li><p>iPhones</strong></del></span>
+<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3></strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+
+<ul class="blurbs">
+ <li id="M201910130"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>wrongs</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
+ phone, as “superusers.”(1) Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
+not involve making</strong></del></span>
+ <span class="inserted"><ins><em>app is mandatory at some
workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
+ but readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a
+ clarification saying</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> the <span
class="removed"><del><strong>user.
+But they are a lot like malware, since they are technical Apple
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201905280">
<p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
+ privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>harm</strong></del></span> <span
class="inserted"><ins><em>are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information</em></ins></span> to <span
class="inserted"><ins><em>third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
@@ -715,44 +716,78 @@
and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>case</em></ins></span> of <span
class="removed"><del><strong>specific Apple software.</p>
+
+<ul>
+ <li>
+ <p>The Apple Music client
+ program</strong></del></span> <span class="inserted"><ins><em>DoorDash).
Once this information
is collected by the company, there is no telling what it will be
used for.</p>
</li>
<li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
- the user's browsing history</a>.</p>
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
+ the user's <span class="removed"><del><strong>file system for music files,
copies them to an Apple
+ server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>browsing
history</a>.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
+ <span class="removed"><del><strong><li>
+ <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+stops users from fixing</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>security bugs in Quicktime for
+ Windows</a>, while refusing</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ illegal</em></ins></span> to <span class="removed"><del><strong>fix them
itself.</p></strong></del></span> <span class="inserted"><ins><em>study
how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
- <li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
- </li>
-
- <li id="M201702150">
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <span class="removed"><del><strong><li>
+ <p>iOS version 9 for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest</em></ins></span> iThings <span
class="inserted"><ins><em>system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn</em></ins></span> them <span
class="removed"><del><strong>irreparably if they were repaired by someone other
than
+ Apple</a>. Apple eventually backed off from this policy under
+ criticism from the users. However, it has not acknowledged that
+ this was wrong.</p>
+ </li>
+
+ <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An</strong></del></span> <span class="inserted"><ins><em>off</a>. A
more advanced way really does turn
+ them off—only until 5am. That's</em></ins></span> Apple <span
class="removed"><del><strong>firmware “upgrade” bricked iPhones
that had been
+ unlocked.</a> The “upgrade” also deactivated applications
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently
intentional.</p></strong></del></span> <span
class="inserted"><ins><em>for you—“We
+ know you want to be spied on”.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>music that users had got from internet music
+ stores that competed with iTunes</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone is snooping on
them.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
+ <li><p>iPhones</strong></del></span>
- <li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <span class="inserted"><ins><em><li id="M201611170">
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -793,7 +828,7 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any <span
class="removed"><del><strong>of them through
+ security to get at them, but <span class="removed"><del><strong>NSA can
access any of them through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
@@ -802,7 +837,7 @@
edited</a>. The <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>of them through <a
+ things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA can access any of them through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
@@ -987,11 +1022,11 @@
</ul>
-<h3 id="tyrants">Apple Tyrants</h3>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
+<h3 <span class="removed"><del><strong>id="tyrants">Apple
Tyrants</h3>
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>id="tyrants">Tyrants</h3>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -1083,7 +1118,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- malware-apple.ja.po 16 Oct 2019 07:30:04 -0000 1.121
+++ malware-apple.ja.po 19 Oct 2019 10:01:31 -0000 1.122
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -152,8 +152,8 @@
"ã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Appleã®ããã¯ãã¢"
+msgid "Back Doors"
+msgstr "ããã¯ãã¢"
#. type: Content of: <ul><li><p>
msgid ""
@@ -225,7 +225,9 @@
"ãã"
#. type: Content of: <h3>
-msgid "Apple Censorship"
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Appleã®æ¤é²"
#. type: Content of: <p>
@@ -236,8 +238,9 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Appleã®DRM"
+#, fuzzy
+msgid "DRM"
+msgstr "ãã£ã¸ã¿ã«å¶é管ç"
#. type: Content of: <ul><li><p>
msgid ""
@@ -295,7 +298,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -343,7 +346,7 @@
#. type: Content of: <h3>
#, fuzzy
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Appleã®å±éºæ§"
#. type: Content of: <p>
@@ -417,7 +420,7 @@
#. type: Content of: <h3>
#, fuzzy
#| msgid "Apple Surveillance"
-msgid "Apple Interference"
+msgid "Interference"
msgstr "Appleã®ç£è¦"
#. type: Content of: <p>
@@ -441,7 +444,9 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Appleã®ç¢ç"
#. type: Content of: <p>
@@ -697,7 +702,7 @@
"æ¤é²ãã¦ãããã¨ãèªãã¾ãã</a>ã"
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -723,7 +728,9 @@
"証ãã¾ãã"
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Appleã®å§å"
#. type: Content of: <p>
@@ -747,7 +754,9 @@
"ãæä¾ãããã¨ãæ絶ãã¾ã</a>ãApple Musicã®è³¼èªè
ã§ãªãå ´åã"
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Appleã®å¦¨å®³"
#. type: Content of: <p>
@@ -916,8 +925,33 @@
"ã«ãã¹ã¦æå³çã§ãã"
#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Appleã®ç£è¦"
+msgid "Surveillance"
+msgstr "ç£è¦"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1232,7 +1266,9 @@
"ãã"
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Appleã®æ´å"
#. type: Content of: <ul><li><p>
@@ -1333,6 +1369,9 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#~ msgid "Apple DRM"
+#~ msgstr "Appleã®DRM"
+
#~ msgid ""
#~ "<a href=\"http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-"
#~ "think-yo.html\"> iOS, the operating system of the Apple iThings, is a "
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-apple.nl-diff.html 16 Oct 2019 07:30:04 -0000 1.75
+++ malware-apple.nl-diff.html 19 Oct 2019 10:01:31 -0000 1.76
@@ -96,7 +96,7 @@
</div>
<span class="removed"><del><strong></div></strong></del></span>
-<h3 id="back-doors">Apple Back Doors</h3>
+<h3 <span class="removed"><del><strong>id="back-doors">Apple
Back</strong></del></span> <span
class="inserted"><ins><em>id="back-doors">Back</em></ins></span>
Doors</h3>
<span class="removed"><del><strong><ul>
<li><p>
Mac</strong></del></span>
@@ -154,45 +154,57 @@
</ul>
-<h3 id="censorship">Apple Censorship</h3>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
+<h3 <span class="removed"><del><strong>id="censorship">Apple
Censorship</h3>
+<ul>
+<li><p>
+Apple censors
+games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from the cr…app store</a> because
of</strong></del></span> <span
class="inserted"><ins><em>id="censorship">Censorship</h3>
+
+<p>Apple mainly uses iOS,</em></ins></span> which <span
class="removed"><del><strong>political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> a <span
class="removed"><del><strong>program from the App Store</a> because its
developers
+committed the enormity of disassembling some iThings.
+</p></li>
-<span class="inserted"><ins><em><p>Apple mainly uses iOS, which is a
typical jail, to impose censorship
-through the</em></ins></span> Apple <span class="removed"><del><strong>censors
-games,</strong></del></span> <span class="inserted"><ins><em>Store. Please
refer to the</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
-some games from</strong></del></span> <span
class="inserted"><ins><em>href="#jails">Apple Jails</a>
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time</strong></del></span> <span
class="inserted"><ins><em>typical jail, to impose censorship
+through</em></ins></span> the <span class="removed"><del><strong>developers
+fixed one “problem”,</strong></del></span> Apple <span
class="removed"><del><strong>complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>Store. Please
refer to</em></ins></span> the <span class="removed"><del><strong>fifth
rejection,
+Apple</strong></del></span> <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based</strong></del></span> <span
class="inserted"><ins><em>href="#jails">Apple Jails</a>
section for more information.</p>
-<h3 id="drm">Apple DRM</h3>
+<h3 id="drm">DRM</h3>
<ul class="blurbs">
<li id="M201908150.1">
- <p>Apple is putting DRM on iPhone batteries, and</em></ins></span>
the <span class="removed"><del><strong>cr…app store</a> because of
which political
-points they suggest. Some political points</strong></del></span> <span
class="inserted"><ins><em>system proprietary
- software <a href="#M201908150">turns off certain features when
batteries</em></ins></span>
- are <span class="removed"><del><strong>apparently considered
-acceptable.</p></strong></del></span> <span
class="inserted"><ins><em>replaced other than by
Apple.</a></p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li><p>
-Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
-banned a program from the App Store</a> because its developers
-committed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704070.1">
- <p>DRM makes</em></ins></span> the <span
class="removed"><del><strong>enormity of disassembling some iThings.
+ <p>Apple is putting DRM</em></ins></span> on <span
class="inserted"><ins><em>iPhone batteries, and</em></ins></span> the <span
class="removed"><del><strong>subject matter</a>.
</p></li>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>iPhone 7 nearly <a
+<li><p>
+As</strong></del></span> <span class="inserted"><ins><em>system proprietary
+ software <a href="#M201908150">turns off certain features when
batteries
+ are replaced other than by Apple.</a></p>
+ </li>
+
+ <li id="M201704070.1">
+ <p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
</li>
<li id="M201512260">
<p><a
-
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"></em></ins></span>
- Apple <span class="removed"><del><strong>rejected</strong></del></span>
<span class="inserted"><ins><em>uses DRM software to prevent people from
charging</em></ins></span> an <span class="removed"><del><strong>app that
displayed the locations of</strong></del></span> <span
class="inserted"><ins><em>iThing
+
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
+ Apple uses DRM software to prevent people from charging an iThing
with a generic USB cable</a>.</p>
</li>
@@ -220,7 +232,7 @@
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 id="incompatibility">Incompatibility</h3>
<p>In this section, we list characteristics of Apple programs that block
or
hinder users from switching to any alternative program—and, in
@@ -261,7 +273,7 @@
</ul>
-<h3 id="insecurity">Apple Insecurity</h3>
+<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -310,7 +322,7 @@
</ul>
-<h3 id="interference">Apple Interference</h3>
+<h3 id="interference">Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify for the
word “sabotage”. Nonetheless, they are nasty and
@@ -328,7 +340,7 @@
</ul>
-<h3 id="jails">Apple Jails</h3>
+<h3 id="jails">Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
iOS, the operating system of the Apple iThings, is the prototype
@@ -437,14 +449,18 @@
</li>
<li id="M201509230">
- <p>As of 2015, Apple <a
-
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically bans apps that endorse abortion rights or would help
+ <p>As</em></ins></span> of 2015, Apple <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically</em></ins></span> bans apps that endorse abortion rights or
would help
women find abortions</a>.</p>
- <p>This particular political slant <a
+<span class="removed"><del><strong><p>
+This</strong></del></span>
+
+ <span class="inserted"><ins><em><p>This</em></ins></span> particular
political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple services</a>.</p>
+ affects other Apple <span class="removed"><del><strong>services</a>.
+</p></li></strong></del></span> <span
class="inserted"><ins><em>services</a>.</p>
</li>
<li id="M201506250">
@@ -481,233 +497,218 @@
<li id="M201402070">
<p>Apple rejected an app that displayed the locations
- of</em></ins></span> US drone assassinations, giving various excuses. Each
+ of US drone assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection, Apple <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted</em></ins></span> it was censoring the app based on the subject
<span class="removed"><del><strong>matter</a>.
-</p></li>
-
-<li><p>
-As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
-rights or would help women find abortions</a>.</p>
-
-<p>
-This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
-affects other Apple services</a>.
-</p></li>
-</ul>
-
-<h3 id="insecurity">Apple Insecurity</h3>
-
-<ul>
- <li>
- <p>A vulnerability in Apple's Image I/O API allowed an attacker
- to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses this API to render
- a certain kind of image file</a>.</p>
- </li>
-
- <li>
- <p>A bug in the iThings Messages
- app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all the user's messaging
history</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>matter</a>.</p></em></ins></span>
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they</strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Apple Manipulation</h3>
+<h3 id="manipulation">Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns”</em></ins></span> are <span
class="removed"><del><strong>not grave enough</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed</em></ins></span> to <span
class="removed"><del><strong>qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of iThings</strong></del></span>
<span class="inserted"><ins><em>mislead users, or make option settings
hard</em></ins></span>
- to <span class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>find</a>.</p>
+ interfaces designed to mislead users, or make option settings hard
+ to find</a>.</p>
- <p>This allows</em></ins></span> a <span
class="removed"><del><strong>system upgrade
- <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.</strong></del></span> <span
class="inserted"><ins><em>company such as</em></ins></span> Apple <span
class="removed"><del><strong>did not forcibly install the upgrade but the
downloading alone caused lots of trouble.</p></strong></del></span> <span
class="inserted"><ins><em>to say, “We allow users
+ <p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
</ul>
-<h3 id="pressuring">Apple Pressuring</h3>
+<h3 id="pressuring">Pressuring</h3>
<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201510270">
- <p>Apple</em></ins></span> Siri <a
+ <p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a> about music charts if you're not an Apple
Music subscriber.</p>
- </li>
+ </li></em></ins></span>
</ul>
-<h3 id="sabotage">Apple Sabotage</h3>
+<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3>
-<span class="removed"><del><strong><p>The wrongs</strong></del></span>
+<ul>
+ <li>
+ <p>A vulnerability</strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Sabotage</h3>
-<span class="inserted"><ins><em><p>These are situations in which Apple
employs its power over users
-to directly intervene</em></ins></span> in <span
class="removed"><del><strong>this section are not precisely malware, since they
do
-not involve making the program</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="removed"><del><strong>runs in</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
+<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application</strong></del></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
+to <span class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>directly intervene in ways that harm them or block
their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>way that hurts</strong></del></span> <span
class="inserted"><ins><em>user of fraud, it
- judges</em></ins></span> the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>case
secretly and presents the verdict
- as</em></ins></span> a <span class="removed"><del><strong>lot like
malware, since they are technical Apple
-actions that harm</strong></del></span> <span class="inserted"><ins><em>fait
accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
+ <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>fraud, it
+ judges the case secretly and presents the verdict
+ as a fait accompli. The punishment to a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off for life, which more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>user's Apple
- devices forever</a>. There is no appeal.</p>
+ being cut off for life, which more-or-less cripples the user's Apple
+ devices forever</a>. There is no appeal.</p></em></ins></span>
</li>
- <li id="M201810240">
+ <span class="removed"><del><strong><li>
+ <p>A bug in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
+ the <span class="removed"><del><strong>iThings Messages
+ app</strong></del></span> <span class="inserted"><ins><em>performance of
older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
- <p>Apple has <a
-
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
-
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span
class="removed"><del><strong>software.</p>
+ <p>Apple has</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
+ Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>malicious web site</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>to block
- Telegram in Russia.</p></em></ins></span>
+ <p>This evidently has</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>do with Russia's command to Apple to block
+ Telegram in Russia.</p>
- <p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
- <span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
- iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
+ <p>The Telegram client is free software on other platforms, but not
on
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ changes</em></ins></span> the <span class="removed"><del><strong>user's
messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201706060">
+<h3 id="interference">Apple Interference</h3>
+<p>Various</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs</em></ins></span> for <span class="removed"><del><strong>music files,
copies them</strong></del></span> <span class="inserted"><ins><em>older model
iThings</a>.</p>
+ bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
+ that's the nature of</em></ins></span> proprietary <span
class="removed"><del><strong>programs often mess up</strong></del></span> <span
class="inserted"><ins><em>software.</p>
</li>
<li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains DRM specifically designed</em></ins></span> to <span
class="inserted"><ins><em><a
+ iPhone 7 contains DRM specifically designed to <a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick it if</em></ins></span> an <span class="removed"><del><strong>Apple
- server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>“unauthorized” repair shop fixes
it</a>.
+ brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses the term “lock”
- to describe the DRM, but we prefer to use the term <a
+ <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like
sabotage,</strong></del></span> <span class="inserted"><ins><em>term
“lock”
+ to describe the DRM,</em></ins></span> but <span
class="removed"><del><strong>they are not grave enough</strong></del></span>
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p></em></ins></span>
+ handcuffs</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201606080"></em></ins></span>
+ <li id="M201606080">
<p>Apple <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"></em></ins></span>
- stops users from fixing the security bugs in Quicktime for
Windows</a>,
+
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+ stops users from fixing the security bugs in Quicktime</em></ins></span>
for <span class="inserted"><ins><em>Windows</a>,
while refusing to fix them itself.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605040">
+ <li id="M201605040">
<p>The Apple Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
- the user's file system for music files, copies them to an Apple server,
- and deletes them</a>.</p>
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ the <span class="removed"><del><strong>word “sabotage”.
Nonetheless, they are nasty</strong></del></span> <span
class="inserted"><ins><em>user's file system for music files, copies them to an
Apple server,</em></ins></span>
+ and <span class="removed"><del><strong>wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>deletes
them</a>.</p>
</li>
- <li id="M201602050"></em></ins></span>
- <p>iOS version 9 for iThings <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <li id="M201602050">
+ <p>iOS version 9 for iThings <a
+
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
- them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
+ Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>eventually backed off from this policy under
criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
<li id="M201510020">
- <p>Apple forced millions of iThings to <a
- href="https://discussions.apple.com/thread/7256669?tstart=0">download
- a system upgrade without asking the users</a>. Apple did not
+ <p>Apple</em></ins></span> forced millions of iThings to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://discussions.apple.com/thread/7256669?tstart=0">download</em></ins></span>
+ a system upgrade
+ <span class="removed"><del><strong><a
href="https://discussions.apple.com/thread/7256669?tstart0=">without</strong></del></span>
<span class="inserted"><ins><em>without</em></ins></span> asking the
users</a>. Apple did not
forcibly install the upgrade but the downloading alone caused lots
of trouble.</p>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201412040">
- <p>Apple <a
-
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted</em></ins></span> from <span
class="inserted"><ins><em>iPods</em></ins></span> the <span
class="removed"><del><strong>users. However, it has not
acknowledged</strong></del></span> <span
class="inserted"><ins><em>music</em></ins></span> that
- <span class="removed"><del><strong>this was
wrong.</p></strong></del></span> <span class="inserted"><ins><em>users
had got from internet music
- stores that competed with iTunes</a>.</p></em></ins></span>
- </li>
+<h3 id="pressuring">Apple Pressuring</h3>
- <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></strong></del></span>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri</strong></del></span>
- <span class="inserted"><ins><em><li id="M200709270">
+ <span class="inserted"><ins><em><li id="M201412040">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
+ about</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the</em></ins></span> music <span
class="removed"><del><strong>charts if you're not an</strong></del></span>
<span class="inserted"><ins><em>that users had got from internet music
+ stores that competed with iTunes</a>.</p>
+ </li>
+
+ <li id="M200709270">
<p><a
-
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"></em></ins></span>
- An Apple firmware “upgrade” bricked iPhones that had been
- <span class="removed"><del><strong>unlocked.</a></strong></del></span>
- <span class="inserted"><ins><em>unlocked</a>.</em></ins></span> The
“upgrade” also deactivated applications
+
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An</em></ins></span> Apple <span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
+ unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently intentional.</p>
+ censorship</a>. All this was apparently
intentional.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
- </li></strong></del></span>
</ul>
-<h3 id="surveillance">Apple Surveillance</h3>
-<span class="removed"><del><strong><ul>
- <li><p>iPhones</strong></del></span>
+<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3></strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+
+<ul class="blurbs">
+ <li id="M201910130"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>wrongs</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
+ phone, as “superusers.”(1) Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
+not involve making</strong></del></span>
+ <span class="inserted"><ins><em>app is mandatory at some
workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
+ but readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a
+ clarification saying</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> the <span
class="removed"><del><strong>user.
+But they are a lot like malware, since they are technical Apple
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201905280">
<p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
+ privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>harm</strong></del></span> <span
class="inserted"><ins><em>are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information</em></ins></span> to <span
class="inserted"><ins><em>third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
@@ -715,44 +716,78 @@
and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>case</em></ins></span> of <span
class="removed"><del><strong>specific Apple software.</p>
+
+<ul>
+ <li>
+ <p>The Apple Music client
+ program</strong></del></span> <span class="inserted"><ins><em>DoorDash).
Once this information
is collected by the company, there is no telling what it will be
used for.</p>
</li>
<li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
- the user's browsing history</a>.</p>
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
+ the user's <span class="removed"><del><strong>file system for music files,
copies them to an Apple
+ server, and deletes them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>browsing
history</a>.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
+ <span class="removed"><del><strong><li>
+ <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+stops users from fixing</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>security bugs in Quicktime for
+ Windows</a>, while refusing</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ illegal</em></ins></span> to <span class="removed"><del><strong>fix them
itself.</p></strong></del></span> <span class="inserted"><ins><em>study
how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
- <li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
- </li>
-
- <li id="M201702150">
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <span class="removed"><del><strong><li>
+ <p>iOS version 9 for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest</em></ins></span> iThings <span
class="inserted"><ins><em>system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn</em></ins></span> them <span
class="removed"><del><strong>irreparably if they were repaired by someone other
than
+ Apple</a>. Apple eventually backed off from this policy under
+ criticism from the users. However, it has not acknowledged that
+ this was wrong.</p>
+ </li>
+
+ <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An</strong></del></span> <span class="inserted"><ins><em>off</a>. A
more advanced way really does turn
+ them off—only until 5am. That's</em></ins></span> Apple <span
class="removed"><del><strong>firmware “upgrade” bricked iPhones
that had been
+ unlocked.</a> The “upgrade” also deactivated applications
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently
intentional.</p></strong></del></span> <span
class="inserted"><ins><em>for you—“We
+ know you want to be spied on”.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>music that users had got from internet music
+ stores that competed with iTunes</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone is snooping on
them.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
+ <li><p>iPhones</strong></del></span>
- <li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <span class="inserted"><ins><em><li id="M201611170">
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -793,7 +828,7 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any <span
class="removed"><del><strong>of them through
+ security to get at them, but <span class="removed"><del><strong>NSA can
access any of them through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
@@ -802,7 +837,7 @@
edited</a>. The <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>of them through <a
+ things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA can access any of them through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
@@ -987,11 +1022,11 @@
</ul>
-<h3 id="tyrants">Apple Tyrants</h3>
-<span class="removed"><del><strong><ul>
- <li><p>Apple</strong></del></span>
+<h3 <span class="removed"><del><strong>id="tyrants">Apple
Tyrants</h3>
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>id="tyrants">Tyrants</h3>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -1083,7 +1118,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:04 $
+$Date: 2019/10/19 10:01:31 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-apple.nl.po 16 Oct 2019 07:30:04 -0000 1.76
+++ malware-apple.nl.po 19 Oct 2019 10:01:31 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -152,7 +152,10 @@
"dat niet is “goedgekeurd” door de fabrikant, niet uitvoeren."
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+# | [-Apple-]Back Doors
+#, fuzzy
+#| msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr "Apple-achterdeuren"
#. type: Content of: <ul><li><p>
@@ -216,7 +219,10 @@
"heeft, want natuurlijk kunnen we Apple vertrouwen."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Apple-censuur"
#. type: Content of: <p>
@@ -227,8 +233,8 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Apple-DRM"
+msgid "DRM"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -288,10 +294,10 @@
msgstr ""
#. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
#, fuzzy
#| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Apple-onveiligheid"
#. type: Content of: <p>
@@ -338,7 +344,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Apple-onveiligheid"
#. type: Content of: <p>
@@ -402,7 +411,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Apple-inmenging"
#. type: Content of: <p>
@@ -427,7 +439,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Apple-tralies"
#. type: Content of: <p>
@@ -664,7 +679,7 @@
# TODO: please take a look.
#. type: Content of: <h3>
#, fuzzy
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "Apple-manipulatie"
#. type: Content of: <ul><li><p>
@@ -690,7 +705,10 @@
"weinigen begrijpen hoe het echt uit te zetten."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Apple-invloed"
#. type: Content of: <p>
@@ -715,7 +733,10 @@
"muziek-hitlijsten als je niet geabonneerd bent op Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Apple-sabotage"
#. type: Content of: <p>
@@ -877,11 +898,39 @@
"html\">Apple-censuur</a>. Dit was blijkbaar allemaal vooropgezet."
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+# | [-Apple-]Surveillance
+#, fuzzy
+#| msgid "Apple Surveillance"
+msgid "Surveillance"
msgstr "Apple-spionage"
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1181,7 +1230,10 @@
"die Apple naar dit adres verstuurt."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Apple-tirannen"
#. type: Content of: <ul><li><p>
@@ -1278,6 +1330,9 @@
msgid "Updated:"
msgstr "Bijgewerkt:"
+#~ msgid "Apple DRM"
+#~ msgstr "Apple-DRM"
+
#~ msgid "<a href=\"#deception\">Interference</a>"
#~ msgstr "<a href=\"#deception\">Oplichterij</a>"
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-apple.pot 16 Oct 2019 07:30:05 -0000 1.86
+++ malware-apple.pot 19 Oct 2019 10:01:31 -0000 1.87
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -121,7 +121,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -173,7 +173,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
msgstr ""
#. type: Content of: <p>
@@ -184,7 +184,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple DRM"
+msgid "DRM"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -234,7 +234,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -280,7 +280,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr ""
#. type: Content of: <p>
@@ -335,7 +335,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
msgstr ""
#. type: Content of: <p>
@@ -355,7 +355,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
msgstr ""
#. type: Content of: <p>
@@ -560,7 +560,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -579,7 +579,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr ""
#. type: Content of: <p>
@@ -598,7 +598,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr ""
#. type: Content of: <p>
@@ -734,7 +734,30 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as “superusers.”(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, “this kind of ‘superuser’ surveillance "
+"could not be conducted on Apple's operating system.”"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -959,7 +982,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- malware-apple.ru.po 16 Oct 2019 14:28:34 -0000 1.225
+++ malware-apple.ru.po 19 Oct 2019 10:01:31 -0000 1.226
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -148,7 +149,7 @@
"пÑоизводиÑелем."
#. type: Content of: <h3>
-msgid "Apple Back Doors"
+msgid "Back Doors"
msgstr "Ðазейки"
#. type: Content of: <ul><li><p>
@@ -222,7 +223,10 @@
"влаÑÑÑÑ, поÑÐ¾Ð¼Ñ ÑÑо мÑ, конеÑно, можем
довеÑÑÑÑ Apple."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "ЦензÑÑа"
#. type: Content of: <p>
@@ -236,7 +240,7 @@
"\">ТÑÑÑмÑ</a>."
#. type: Content of: <h3>
-msgid "Apple DRM"
+msgid "DRM"
msgstr "ЦиÑÑовое ÑпÑавление огÑаниÑениÑми"
#. type: Content of: <ul><li><p>
@@ -306,7 +310,10 @@
"Ñвоим клиенÑам, на Ñем пÑоÑмаÑÑиваÑÑ
кÑпленнÑе ими видеоÑолики</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "ÐеÑовмеÑÑимоÑÑÑ"
#. type: Content of: <p>
@@ -377,7 +384,10 @@
"неподÑ
одÑÑими Ð´Ð»Ñ ÑоÑ
ÑанениÑ
докÑменÑов</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "УÑзвимоÑÑÑ"
#. type: Content of: <p>
@@ -462,7 +472,10 @@
"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "ÐомеÑ
и"
#. type: Content of: <p>
@@ -491,7 +504,10 @@
"заменÑÑÑÑÑ ÐºÐµÐ¼-Ñо, кÑоме Apple.</a>"
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "ТÑÑÑмÑ"
#. type: Content of: <p>
@@ -794,7 +810,10 @@
"drone-strikes/\">пÑизнала, ÑÑо ÑÑо ÑензÑÑа
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ ÑемаÑике</a>."
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "ÐанипÑлÑÑиÑ"
#. type: Content of: <ul><li><p>
@@ -820,7 +839,10 @@
"поймеÑ, как же ÑÑо оÑклÑÑиÑÑ."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Ðавление"
#. type: Content of: <p>
@@ -845,7 +867,10 @@
"попÑлÑÑноÑÑи мÑзÑки, еÑли Ð²Ñ Ð½Ðµ подпиÑанÑ
на Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "СабоÑаж"
#. type: Content of: <p>
@@ -1045,11 +1070,36 @@
"по-видимомÑ, Ñделано пÑеднамеÑенно."
#. type: Content of: <h3>
-msgid "Apple Surveillance"
+msgid "Surveillance"
msgstr "Слежка"
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
@@ -1389,7 +1439,10 @@
"поÑÑÑ Ð¸ полÑÑиÑÑ ÐºÐ¾Ð´, коÑоÑÑй поÑÑÐ»Ð°ÐµÑ Apple."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "ТиÑанÑ"
#. type: Content of: <ul><li><p>
@@ -1490,6 +1543,9 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#~ msgid "Apple DRM"
+#~ msgstr "ЦиÑÑовое ÑпÑавление огÑаниÑениÑми"
+
#~ msgid ""
#~ "It cited a bizarre excuse, but the real reason is surely, “China "
#~ "ordered us to ban it.”"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- nl.po 16 Oct 2019 07:30:05 -0000 1.150
+++ nl.po 19 Oct 2019 10:01:31 -0000 1.151
@@ -665,10 +665,6 @@
"<a href=\"#tyrants\">Tirannen</a>—systemen die elk besturingssysteem "
"dat niet is “goedgekeurd” door de fabrikant, niet uitvoeren."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Apple-achterdeuren"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -738,7 +734,10 @@
"heeft, want natuurlijk kunnen we Apple vertrouwen."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "Apple-censuur"
#. type: Content of: <p>
@@ -748,10 +747,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "Apple-DRM"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -819,10 +814,10 @@
msgstr ""
#. type: Content of: <h3>
-# | Apple [-Insecurity-] {+Incompatibility+}
+# | [-Apple Insecurity-]{+Incompatibility+}
#, fuzzy
#| msgid "Apple Insecurity"
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "Apple-onveiligheid"
#. type: Content of: <p>
@@ -869,7 +864,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "Apple-onveiligheid"
#. type: Content of: <p>
@@ -943,7 +941,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "Apple-inmenging"
#. type: Content of: <p>
@@ -968,7 +969,10 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "Apple-tralies"
#. type: Content of: <p>
@@ -1257,12 +1261,11 @@
"apple-app-tracks-drone-strikes/\">gaf Apple toe dat het de app censureerde "
"op basis van de inhoud</a>."
+# TODO: please take a look.
#. type: Content of: <h3>
-# | Apple [-Deception-] {+Manipulation+}
#, fuzzy
-#| msgid "Apple Deception"
-msgid "Apple Manipulation"
-msgstr "Apple-oplichterij"
+msgid "Manipulation"
+msgstr "Apple-manipulatie"
#. type: Content of: <ul><li><p>
msgid ""
@@ -1287,7 +1290,10 @@
"weinigen begrijpen hoe het echt uit te zetten."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Apple-invloed"
#. type: Content of: <p>
@@ -1312,7 +1318,10 @@
"muziek-hitlijsten als je niet geabonneerd bent op Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "Apple-sabotage"
#. type: Content of: <p>
@@ -1523,9 +1532,30 @@
"proprietary/proprietary-jails.html\">Apple-censuur</a>. Dit was blijkbaar "
"allemaal vooropgezet."
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Apple-spionage"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1905,7 +1935,10 @@
"die Apple naar dit adres verstuurt."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "Apple-tirannen"
#. type: Content of: <ul><li><p>
@@ -6716,6 +6749,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -7515,21 +7571,21 @@
"je meestal belazerd."
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
+# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
+# | directory list around 400 instances of malicious [-functionalities,-]
+# | {+functionalities (with more than 500 references to back them up),+} but
# | there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
-#| "As of April, 2017, the files in this directory list around 300 instances "
+#| "As of April, 2019, the files in this directory list around 400 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
-"Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
+"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
"kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
"gevallen waar we niks van weten."
@@ -8872,6 +8928,60 @@
"processors will have tyrant software built in</a>."
msgstr ""
+#~ msgid "Apple Back Doors"
+#~ msgstr "Apple-achterdeuren"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "Apple-censuur"
+
+#~ msgid "Apple DRM"
+#~ msgstr "Apple-DRM"
+
+#, fuzzy
+#~| msgid "Apple Insecurity"
+#~ msgid "Apple Incompatibility"
+#~ msgstr "Apple-onveiligheid"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "Apple-onveiligheid"
+
+#~ msgid "Apple Interference"
+#~ msgstr "Apple-inmenging"
+
+#~ msgid "Apple Jails"
+#~ msgstr "Apple-tralies"
+
+#, fuzzy
+#~| msgid "Apple Deception"
+#~ msgid "Apple Manipulation"
+#~ msgstr "Apple-oplichterij"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Apple-invloed"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "Apple-sabotage"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Apple-spionage"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "Apple-tirannen"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- pl.po 16 Oct 2019 07:30:05 -0000 1.149
+++ pl.po 19 Oct 2019 10:01:31 -0000 1.150
@@ -656,10 +656,6 @@
"systemy, które odrzucajÄ
systemy operacyjne nie „autoryzowane” "
"przez producenta."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -708,7 +704,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
msgstr ""
#. type: Content of: <p>
@@ -718,10 +714,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -767,7 +759,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -814,7 +806,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr ""
#. type: Content of: <p>
@@ -870,7 +862,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
msgstr ""
#. type: Content of: <p>
@@ -890,7 +882,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
msgstr ""
#. type: Content of: <p>
@@ -1091,7 +1083,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1110,7 +1102,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr ""
#. type: Content of: <p>
@@ -1128,7 +1120,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr ""
#. type: Content of: <p>
@@ -1260,8 +1252,29 @@
"apparently intentional."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1485,7 +1498,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6039,6 +6052,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -6838,9 +6874,9 @@
#. type: Content of: <p>
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
#. type: Content of: <table><tr><th>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- pot 16 Oct 2019 07:30:05 -0000 1.148
+++ pot 19 Oct 2019 10:01:31 -0000 1.149
@@ -513,10 +513,6 @@
"system not “authorized” by the manufacturer."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -565,7 +561,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
msgstr ""
#. type: Content of: <p>
@@ -575,10 +571,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -624,7 +616,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -671,7 +663,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr ""
#. type: Content of: <p>
@@ -727,7 +719,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
msgstr ""
#. type: Content of: <p>
@@ -747,7 +739,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
msgstr ""
#. type: Content of: <p>
@@ -948,7 +940,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -967,7 +959,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr ""
#. type: Content of: <p>
@@ -985,7 +977,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr ""
#. type: Content of: <p>
@@ -1117,8 +1109,29 @@
"apparently intentional."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1342,7 +1355,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -5800,6 +5813,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -6472,9 +6508,9 @@
#. type: Content of: <p>
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
#. type: Content of: <table><tr><th>
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-back-doors.de-diff.html 4 Oct 2019 08:00:46 -0000 1.32
+++ proprietary-back-doors.de-diff.html 19 Oct 2019 10:01:31 -0000 1.33
@@ -455,10 +455,48 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M201910130.1">
+ <p>The Chinese Communist Party's <a
+ href="/proprietary/proprietary-surveillance.html#M201910130">
+ “Study the Great Nation” app</a> was found to contain
<a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to run any code they wish</a> in the
+ users' phone, as “superusers.”</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying</em></ins></span> that <span class="inserted"><ins><em>the tests
were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant</em></ins></span> it
<span class="removed"><del><strong>considers malicious.
+ But there</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
- ChromeOS has a universal back door</em></ins></span> that <span
class="removed"><del><strong>it considers malicious.
- But there</strong></del></span> is <span class="inserted"><ins><em>used
for updates and <a
+ ChromeOS has a universal back door that</em></ins></span> is <span
class="inserted"><ins><em>used for updates and <a
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
appears to be</em></ins></span> no <span
class="removed"><del><strong>excuse</strong></del></span> <span
class="inserted"><ins><em>support whatsoever</em></ins></span> for <span
class="removed"><del><strong><em>deleting</em></strong></del></span>
the <span class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
@@ -844,7 +882,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/04 08:00:46 $
+$Date: 2019/10/19 10:01:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary-back-doors.de.po 4 Oct 2019 08:00:46 -0000 1.131
+++ proprietary-back-doors.de.po 19 Oct 2019 10:01:31 -0000 1.132
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -761,6 +761,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-back-doors.es.po 4 Oct 2019 08:59:26 -0000 1.23
+++ proprietary-back-doors.es.po 19 Oct 2019 10:01:32 -0000 1.24
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-09-12 12:36+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -658,6 +659,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-back-doors.fr.po 4 Oct 2019 08:52:50 -0000 1.142
+++ proprietary-back-doors.fr.po 19 Oct 2019 10:01:32 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-10-04 10:51+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -666,6 +667,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-back-doors.it-diff.html 4 Oct 2019 08:00:46 -0000 1.59
+++ proprietary-back-doors.it-diff.html 19 Oct 2019 10:01:32 -0000 1.60
@@ -265,9 +265,7 @@
<span class="inserted"><ins><em><li id="M201210220">
<p id="swindle-eraser">The Amazon
Kindle-Swindle</em></ins></span> has a back door that <span
class="inserted"><ins><em>has been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
- “upload files” as well as forcibly install
- apps</a>.</p>
- <p>It</strong></del></span>
+ “upload</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
<cite>1984</cite>, by George Orwell.</p>
@@ -280,7 +278,7 @@
offered her kafkaesque “explanations.”</p>
<p>Do other ebook readers have back doors in their nonfree software?
We
- don't know, and we have no way to find out. There</em></ins></span> is
<span class="inserted"><ins><em>no reason to
+ don't know, and we have no way to find out. There is no reason to
assume that they don't.</p>
</li>
@@ -301,7 +299,7 @@
Google Play store contained a module that was designed to <a
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on the user's computer</a>. The app developers
- regularly</em></ins></span> used <span class="inserted"><ins><em>it to
make the computer download and execute any code
+ regularly used it to make the computer download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
@@ -316,16 +314,13 @@
(all?) apps.</p>
<p>The specific change described in the article was not
- malicious—it protected users from surveillance</em></ins></span> by
<span class="removed"><del><strong>14,000 Android
applications.</p></strong></del></span> <span
class="inserted"><ins><em>third
- parties—but that is a separate question.</p></em></ins></span>
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
</li>
-<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811100">
- <p>Corel Paintshop Pro</em></ins></span> has a <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
back door that can make it cease to function</a>.</p>
<p>The article is full of confusions, errors and biases that we have
@@ -333,9 +328,7 @@
<ul>
<li>Getting a patent does not “enable” a company to do
- any particular thing</em></ins></span> in <span
class="inserted"><ins><em>its products. What it does enable</em></ins></span>
the <span class="removed"><del><strong>backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with</strong></del></span>
<span class="inserted"><ins><em>company
+ any particular thing in its products. What it does enable the company
to do is sue other companies if they do some particular thing in
their products.</li>
@@ -350,27 +343,22 @@
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
that have nothing in common</a>.</p>
- <p>In addition,</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>speak of “protecting” that bogus
- generalization is a separate absurdity. It's like
calling</em></ins></span> the <span
class="removed"><del><strong>engine</a>
- remotely.</p>
- </li>
-<li><p>
-Mac OS X had</strong></del></span> <span class="inserted"><ins><em>cops
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even with a jackhammer, because it
is</em></ins></span> an
- <span class="inserted"><ins><em>abstraction and can't be affected by
physical action.</p></li>
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
</ul>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
@@ -381,182 +369,240 @@
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has
a</em></ins></span> back door <span class="removed"><del><strong>for 4
years</a>.
-</p></li>
-
-<li><p>Users reported</strong></del></span> that <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files” as well as forcibly install
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload</em></ins></span> files” as well as forcibly
install
apps</a>.</p>
<p>It is used by 14,000 Android applications.</p>
</li>
- <li id="M201112080">
- <p> In addition</em></ins></span> to <span
class="removed"><del><strong>replace</strong></del></span> <span
class="inserted"><ins><em>its <a href="#windows-update">universal back
- door</a>,</em></ins></span> Windows <span
class="removed"><del><strong>7 and</strong></del></span> 8 <span
class="removed"><del><strong>with all-spying
- Windows 10</a>.</p>
+<span class="removed"><del><strong><li><p>ARRIS cable modem has
a</strong></del></span>
- <p>Microsoft was in fact</strong></del></span> <span
class="inserted"><ins><em>has a back door for</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching
on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ <span class="inserted"><ins><em><li id="M201112080">
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>, Windows 8 has a back door for <a
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
- <p>You might well decide to let</em></ins></span> a <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>security service that you trust
- remotely <em>deactivate</em> programs</em></ins></span> that
<span class="removed"><del><strong>said whether to “upgrade” to
Windows 10 when users
- had turned</strong></del></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>considers malicious.
+ <p>You might well decide to let a security service that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
- should have</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>right</em></ins></span> to <span
class="removed"><del><strong>Windows 10</a>.</p>
-
- <p>This seems</strong></del></span> <span
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span
class="removed"><del><strong>involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>trust</em></ins></span> in <span
class="removed"><del><strong>Windows 7 and 8.</p></strong></del></span>
<span class="inserted"><ins><em>this
- way.</p></em></ins></span>
+ should have the right to decide whom (if anyone) to trust in this
+ way.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Most mobile phones have a universal back door, which has been used
to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201103070">
- <p>In Android,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a <span
class="removed"><del><strong>universal back door</a>. Nearly all
-models of mobile phones have a universal</strong></del></span> back door <span
class="inserted"><ins><em>to remotely delete apps</a>. (It
was</em></ins></span> in <span class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span class="inserted"><ins><em>a
- program called GTalkService, which seems since then</em></ins></span> to
<span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>have been
+ <li id="M201103070">
+ <p>In Android, <a
+
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps</a>. (It was in a
+ program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
<p>Google can also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService.
This</em></ins></span> is <span class="removed"><del><strong>controlled
-by Coolpad.
-</p>
-</li>
-
-<li>
-<p>Microsoft Windows has</strong></del></span>
- <span class="inserted"><ins><em>not equivalent to</em></ins></span> a
universal back <span class="removed"><del><strong>door through which
-<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
-</p>
-<p>More information on when
-<a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"></strong></del></span>
<span class="inserted"><ins><em>door, but permits various dirty
+ forcibly and remotely install apps</a> through GTalkService. This is
+ not equivalent to a universal back door, but permits various dirty
tricks.</p>
- <p>Although Google's <em>exercise</em>
of</em></ins></span> this <span class="removed"><del><strong>was used</a>.
-</p>
-<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>power has not been
- malicious so far,</em></ins></span> the <span
class="removed"><del><strong>universal back door</strong></del></span> <span
class="inserted"><ins><em>point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
-“upgrades” will</strong></del></span> <span
class="inserted"><ins><em>that nobody should have such power,
- which could also</em></ins></span> be <span
class="removed"><del><strong><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
-</p>
-</li>
-
-<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point is that nobody should have such power,
+ which could also be used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing
it</em></ins></span> to <span class="removed"><del><strong>potential back
-door capabilities of</strong></del></span>
- <span
class="inserted"><ins><em><em>delete</em></em></ins></span> the
<span class="removed"><del><strong>TPM 2.0
chip</a>.</p></strong></del></span> <span
class="inserted"><ins><em>programs, and you should have the right to decide
- who (if anyone) to trust in this way.</p></em></ins></span>
+ it considers malicious. But there is no excuse for allowing it to
+ <em>delete</em> the programs, and you should have the right to
decide
+ who (if anyone) to trust in this way.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
+ <li id="M200808110">
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
- this power because of course we can trust <span
class="removed"><del><strong>Apple.
-</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
+ “inappropriate”. Jobs said it's OK for Apple to have
+ this power because of course we can trust Apple.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p>The iPhone</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M201910130.1">
+ <p>The Chinese Communist Party's</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130">
+ “Study</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
+ <li><p>Caterpillar vehicles come with</strong></del></span>
<span class="inserted"><ins><em>Great Nation” app</a> was found to
contain</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a</em></ins></span> back-door <span class="inserted"><ins><em>allowing
developers</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>run any code they wish</a> in</em></ins></span>
the <span class="removed"><del><strong>engine</a>
+ remotely.</p>
+ </li>
+<li><p>
+Mac OS X had an</strong></del></span>
+ <span class="inserted"><ins><em>users' phone, as
“superusers.”</p>
+
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>Users reported</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying</em></ins></span> that <span class="inserted"><ins><em>the tests
were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it</em></ins></span>
<a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access</em></ins></span> to <span class="removed"><del><strong>replace
Windows 7</strong></del></span> <span class="inserted"><ins><em>the phone's
microphone, photos, text messages, contacts,</em></ins></span> and <span
class="removed"><del><strong>8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft</strong></del></span>
+ <span class="inserted"><ins><em>internet history</a>, and the
Android version</em></ins></span> was <span class="inserted"><ins><em>found to
contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in <span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying</em></ins></span> that <span
class="removed"><del><strong>run Windows 7</strong></del></span> <span
class="inserted"><ins><em>the tests were only performed on the
+ Android version of the app,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be
conducted</em></ins></span>
+ on <span class="inserted"><ins><em>Apple's operating
system.”</p>
+ </li>
+
<li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
- ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="inserted"><ins><em>that is used</em></ins></span> for <span
class="inserted"><ins><em>updates and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
- ceases to operate at a predefined date</a>. From then on, there
- appears to be no support whatsoever for the computer.</p>
+ ChromeOS has</em></ins></span> a <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>is used for updates and <a
+
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+ ceases</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>operate at a predefined date</a>. From then on,
there
+ appears</em></ins></span> to <span class="removed"><del><strong>Windows
10</strong></del></span> <span class="inserted"><ins><em>be no support
whatsoever for the computer.</p>
+
+ <p>In other words,</em></ins></span> when <span
class="removed"><del><strong>users
+ had turned it off.</p>
- <p>In other words, when you stop getting screwed by the back door,
+ <p>Later on, Microsoft published instructions
on</strong></del></span> <span class="inserted"><ins><em>you stop getting
screwed by the back door,
you start getting screwed by the obsolescence.</p>
</li>
<li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>permanently reject</strong></del></span> the <span
class="removed"><del><strong>downgrade to Windows 10</a>.</p>
+
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>involve
use of</strong></del></span> <span class="inserted"><ins><em>the cellular phone
network and sends Ford</em></ins></span> a <span
class="removed"><del><strong>back door in Windows 7</strong></del></span> <span
class="inserted"><ins><em>lot of data,
including car location. This feature operates even when the ignition
- key is removed, and</em></ins></span> users <span
class="removed"><del><strong>are led into enabling</strong></del></span> <span
class="inserted"><ins><em>report that they can't disable it.</p>
+ key is removed,</em></ins></span> and <span
class="removed"><del><strong>8.</p></strong></del></span> <span
class="inserted"><ins><em>users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
- antenna in aluminum foil?</p>
+ antenna in aluminum foil?</p></em></ins></span>
</li>
- <li id="M201812300">
+<span class="removed"><del><strong><li>
+<p>Most mobile phones have</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ offer the feature of</em></ins></span> a universal back <span
class="removed"><del><strong>door, which</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
<p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
+ developer. With this malfeature, GM</em></ins></span> has <span
class="removed"><del><strong>been used to
+<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>explicitly
made things even
+ worse.</p></em></ins></span>
</li>
- <li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely
convert</em></ins></span> it <span class="removed"><del><strong>without
understanding.
-</p></strong></del></span>
- <span class="inserted"><ins><em>into one.</p></em></ins></span>
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version of Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711244">
+ <p>The Furby Connect</em></ins></span> has a <span
class="inserted"><ins><em><a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"></em></ins></span>
+ universal back door</a>. <span class="removed"><del><strong>Nearly
all
+models of mobile phones have a universal back door in</strong></del></span>
<span class="inserted"><ins><em>If</em></ins></span> the <span
class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
+by Coolpad.
+</p></strong></del></span> <span class="inserted"><ins><em>the code
could surely convert it
+ into one.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Apple can,</strong></del></span>
+<p>Microsoft Windows</strong></del></span>
<span class="inserted"><ins><em><li id="M201711010">
- <p>Sony has brought back its robotic pet Aibo, this time <a
+ <p>Sony</em></ins></span> has <span class="removed"><del><strong>a
universal</strong></del></span> <span
class="inserted"><ins><em>brought</em></ins></span> back <span
class="removed"><del><strong>door through which
+<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on the users</a>.
+</p>
+<p>More information on when
+<a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"></strong></del></span>
<span class="inserted"><ins><em>its robotic pet Aibo,</em></ins></span> this
<span class="removed"><del><strong>was used</a>.
+</p>
+<p>In Windows 10, the</strong></del></span> <span
class="inserted"><ins><em>time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered to a server that requires
- a subscription</a>.</p>
+ with a</em></ins></span> universal back <span
class="removed"><del><strong>door is no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>door,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>tethered to a
server that requires
+ a subscription</a>.</p></em></ins></span>
</li>
- <li id="M201709090.1">
- <p>Tesla used software to limit the part of the battery
- that was available to customers in some cars,</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
- a universal back door in the software</a> to temporarily increase
+<span class="removed"><del><strong><li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709090.1">
+ <p>Tesla used software</em></ins></span> to <span
class="removed"><del><strong>potential back
+door capabilities</strong></del></span> <span class="inserted"><ins><em>limit
the part</em></ins></span> of the <span class="removed"><del><strong>TPM 2.0
chip</a>.</p>
+</li>
+
+<li>
+<p>The iPhone has</strong></del></span> <span
class="inserted"><ins><em>battery
+ that was available to customers in some cars, and <a
+
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"></em></ins></span>
+ a <span class="inserted"><ins><em>universal</em></ins></span> back door
+<span class="removed"><del><strong><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple</strong></del></span> <span class="inserted"><ins><em>in the
software</a></em></ins></span> to <span
class="inserted"><ins><em>temporarily increase
this limit.</p>
- <p>While</em></ins></span> remotely <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>allowing car “owners” to use the
- whole battery capacity did not do them any harm, the same back
- door would permit Tesla (perhaps under the command of</em></ins></span>
some <span class="removed"><del><strong>data from iPhones
for</strong></del></span>
+ <p>While</em></ins></span> remotely <span
class="removed"><del><strong>delete apps</a> which Apple considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span class="inserted"><ins><em>allowing car
“owners”</em></ins></span> to <span
class="removed"><del><strong>have this power
+because of course we can trust Apple.
+</p>
+</li>
+
+<li>
+<p>The iPhone has a</strong></del></span> <span
class="inserted"><ins><em>use the
+ whole battery capacity did not do them any harm, the
same</em></ins></span> back
+ door <span class="removed"><del><strong>for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract</strong></del></span> <span class="inserted"><ins><em>would
permit Tesla (perhaps under the command of</em></ins></span> some <span
class="removed"><del><strong>data from iPhones for</strong></del></span>
<span class="inserted"><ins><em>government) to remotely
order</em></ins></span> the <span class="removed"><del><strong>state</a>.
</p>
<p>This may</strong></del></span> <span class="inserted"><ins><em>car
to use none of its battery. Or
@@ -888,7 +934,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/04 08:00:46 $
+$Date: 2019/10/19 10:01:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-back-doors.it.po 4 Oct 2019 08:00:46 -0000 1.124
+++ proprietary-back-doors.it.po 19 Oct 2019 10:01:32 -0000 1.125
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -778,6 +778,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-back-doors.ja-diff.html 4 Oct 2019 08:00:47 -0000 1.57
+++ proprietary-back-doors.ja-diff.html 19 Oct 2019 10:01:32 -0000 1.58
@@ -353,176 +353,215 @@
<p>It is used by 14,000 Android applications.</p>
</li>
-<span class="removed"><del><strong><li><p>ARRIS cable modem has a
- <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201112080">
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>, Windows 8 has a back door for <a
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ remotely deleting apps</a>.</p>
+
+ <p>You might well decide to let a security service that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there is no excuse for <em>deleting</em> the programs, and
you
+ should have the right to decide whom (if anyone) to trust in this
+ way.</p>
+ </li>
+
+ <li id="M201103070">
+ <p>In Android, <a
+
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
+ Google</em></ins></span> has a
+ <span class="removed"><del><strong><a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
backdoor in the backdoor</a>.</p>
</li>
<li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>back door to
remotely delete apps</a>. (It was in a
+ program called GTalkService, which seems since then to have been
+ merged into Google Play.)</p>
- <span class="inserted"><ins><em><li id="M201112080">
- <p> In addition</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a>
- remotely.</p>
+ <p>Google can also <a
+
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through GTalkService. This is
+ not equivalent to a universal back door, but permits various dirty
+ tricks.</p>
+
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point is that nobody should have such power,
+ which could also be used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for allowing
it</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span>
+ <span
class="inserted"><ins><em><em>delete</em></em></ins></span> the
<span class="removed"><del><strong>engine</a>
+ remotely.</p></strong></del></span> <span
class="inserted"><ins><em>programs, and you should have the right to decide
+ who (if anyone) to trust in this way.</p></em></ins></span>
</li>
-<li><p>
-Mac OS X had an</strong></del></span> <span
class="inserted"><ins><em>its</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
- door</a>, Windows 8 has a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
+<span class="removed"><del><strong><li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200808110">
+ <p>The iPhone has a</em></ins></span> back door <span
class="removed"><del><strong>for 4 years</a>.
</p></li>
-<li><p>Users reported that</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely deleting apps</a>.</p>
+<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
+ that <span class="inserted"><ins><em>allows Apple to remotely delete
apps</a> which Apple considers
+ “inappropriate”. Jobs said it's OK for Apple to have
+ this power because of course we can trust Apple.</p>
+ </li>
+</ul>
- <p>You might well decide</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
- <p>Microsoft was in fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching
on</strong></del></span> <span class="inserted"><ins><em>let</em></ins></span>
a <span class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>security service that you trust
- remotely <em>deactivate</em> programs</em></ins></span> that
<span class="removed"><del><strong>said whether to “upgrade” to
Windows 10 when users
- had turned</strong></del></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>considers malicious.
- But there is no excuse for <em>deleting</em></em></ins></span>
the <span class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>programs, and you
- should have the right</em></ins></span> to <span
class="removed"><del><strong>Windows 10</a>.</p>
+<h3 id='universal'>Full control</h3>
- <p>This seems</strong></del></span> <span
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span
class="removed"><del><strong>involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>trust</em></ins></span> in <span
class="removed"><del><strong>Windows 7 and 8.</p></strong></del></span>
<span class="inserted"><ins><em>this
- way.</p></em></ins></span>
- </li>
+<ul class="blurbs">
+ <li id="M201910130.1">
+ <p>The Chinese Communist Party's</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130">
+ “Study the Great Nation” app</a></em></ins></span> was
<span class="removed"><del><strong>forcing them</strong></del></span> <span
class="inserted"><ins><em>found</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
-<span class="removed"><del><strong><li>
-<p>Most mobile phones have a universal back door, which has been used
to</strong></del></span>
+ <p>Microsoft was in fact</strong></del></span> <span
class="inserted"><ins><em>contain</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to</em></ins></span> run <span
class="removed"><del><strong>Windows 7 and 8</a>, switching
on</strong></del></span> <span class="inserted"><ins><em>any code they
wish</a> in the
+ users' phone, as “superusers.”</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes</em></ins></span> a
<span class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>said
whether to “upgrade”</strong></del></span> <span
class="inserted"><ins><em>the tests were only performed on the Android version
+ of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>Windows 10 when</strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires</em></ins></span> users
+ <span class="removed"><del><strong>had turned</strong></del></span> <span
class="inserted"><ins><em>to grant</em></ins></span> it <span
class="removed"><del><strong>off.</p>
+
+ <p>Later on, Microsoft published instructions
on</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access</em></ins></span> to <span class="removed"><del><strong>permanently
reject</strong></del></span> the <span class="removed"><del><strong>downgrade
to Windows 10</a>.</p>
+
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
+ internet history</a>, and the Android version was
found</em></ins></span> to <span class="removed"><del><strong>involve use
of</strong></del></span> <span
class="inserted"><ins><em>contain</em></ins></span> a <span
class="removed"><del><strong>back door</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish</em></ins></span> in <span class="removed"><del><strong>Windows
7</strong></del></span> <span class="inserted"><ins><em>the users'
+ phone, as “superusers.”(1) Downloading</em></ins></span> and
<span class="removed"><del><strong>8.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201103070">
- <p>In Android,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<li>
+<p>Most mobile phones have a universal back door, which has been used
to</strong></del></span> <span class="inserted"><ins><em>using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
</p>
</li>
<li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a <span
class="removed"><del><strong>universal back door</a>. Nearly all
-models of mobile phones have a universal</strong></del></span> back door <span
class="inserted"><ins><em>to remotely delete apps</a>. (It
was</em></ins></span> in <span class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span class="inserted"><ins><em>a
- program called GTalkService, which seems since then</em></ins></span> to
<span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>have been
- merged into Google Play.)</p>
-
- <p>Google can also <a
-
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService.
This</em></ins></span> is <span class="removed"><del><strong>controlled
+A Chinese</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post</em></ins></span> version of <span
class="removed"><del><strong>Android has</strong></del></span> <span
class="inserted"><ins><em>the article</a> (partly obfuscated,
+ but readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>universal back door</a>. Nearly all
+models of mobile phones have</strong></del></span> <span
class="inserted"><ins><em>text editor) includes</em></ins></span> a <span
class="removed"><del><strong>universal back door in</strong></del></span>
+ <span class="inserted"><ins><em>clarification saying
that</em></ins></span> the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the
+ Android version of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
by Coolpad.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>Apple,
“this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p></em></ins></span>
+ </li>
-<li>
-<p>Microsoft Windows has</strong></del></span>
- <span class="inserted"><ins><em>not equivalent to</em></ins></span> a
universal back <span class="removed"><del><strong>door through which
-<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
+<span class="removed"><del><strong><li>
+<p>Microsoft Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908220">
+ <p>ChromeBooks are programmed for obsolescence:
+ ChromeOS</em></ins></span> has a universal back door <span
class="removed"><del><strong>through which</strong></del></span> <span
class="inserted"><ins><em>that is used for updates and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+ ceases to operate at a predefined date</a>. From then on, there
+ appears to</em></ins></span> be <span class="removed"><del><strong>imposed
on</strong></del></span> <span class="inserted"><ins><em>no support whatsoever
for</em></ins></span> the <span class="removed"><del><strong>users</a>.
</p>
<p>More information on when
<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.
-</p>
-<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
- tricks.</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
- <p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far,</em></ins></span> the <span
class="removed"><del><strong>universal back door</strong></del></span> <span
class="inserted"><ins><em>point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
-“upgrades” will</strong></del></span> <span
class="inserted"><ins><em>that nobody should have such power,
- which could also</em></ins></span> be <span
class="removed"><del><strong><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+ <p>In <span class="removed"><del><strong>Windows
10,</strong></del></span> <span class="inserted"><ins><em>other words, when you
stop getting screwed by</em></ins></span> the <span
class="removed"><del><strong>universal back door is no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
and immediately imposed</a>.
</p>
</li>
<li>
-<p>Windows 8's back doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em>
programs</em></ins></span> that
-<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
-the German government has decided</strong></del></span>
- it <span class="removed"><del><strong>can't be trusted</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this way.</p></em></ins></span>
+<p>Windows 8's</strong></del></span> back <span
class="removed"><del><strong>doors are so gaping that
+<a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span class="inserted"><ins><em>door,
+ you start getting screwed by</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>obsolescence.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
- <p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
- this power because of course we can trust <span
class="removed"><del><strong>Apple.
-</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>The iPhone</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-
-<h3 id='universal'>Full control</h3>
-
-<ul class="blurbs">
- <li id="M201908220">
- <p>ChromeBooks are programmed for obsolescence:
- ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="inserted"><ins><em>that is used</em></ins></span> for
-<span class="removed"><del><strong><a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but users are led into
enabling
-it without understanding.
-</p>
-</li>
-
-<li>
- <p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>updates</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
- ceases to operate at a predefined date</a>. From then on, there
- appears to be no support whatsoever</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
-
- <p>In other words, when you stop getting screwed by the back door,
- you start getting screwed by the obsolescence.</p>
- </li>
-
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ <span class="inserted"><ins><em><li id="M201902011"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>a back
door</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>improved with</strong></del></span> <span
class="inserted"><ins><em>you succeeded in breaking the
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>this power
+because</strong></del></span> <span class="inserted"><ins><em>you succeeded in
breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201812300">
- <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8</strong></del></span>
- <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ <p>New GM cars <a
+ href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>a universal
back door</a>.</p>
- <p>Every nonfree program offers the user zero</em></ins></span>
security <span class="removed"><del><strong>improvements</a>;
but</strong></del></span> <span class="inserted"><ins><em>against its
+ <p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
- worse.</p>
+ worse.</p></em></ins></span>
</li>
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711244"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>back door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
into one.</p></em></ins></span>
</li>
@@ -872,7 +911,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/04 08:00:47 $
+$Date: 2019/10/19 10:01:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary-back-doors.ja.po 4 Oct 2019 08:00:47 -0000 1.105
+++ proprietary-back-doors.ja.po 19 Oct 2019 10:01:32 -0000 1.106
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -602,6 +602,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary-back-doors.pot 4 Oct 2019 08:00:47 -0000 1.73
+++ proprietary-back-doors.pot 19 Oct 2019 10:01:33 -0000 1.74
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -454,6 +454,50 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201910130\"> “Study "
+"the Great Nation” app</a> was found to contain <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
+"a back-door allowing developers to run any code they wish</a> in the users' "
+"phone, as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, “this kind of ‘superuser’ surveillance "
+"could not be conducted on Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as “superusers.”(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, “this kind of ‘superuser’ surveillance "
+"could not be conducted on Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a "
"href=\"https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\">
"
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary-back-doors.ru.po 4 Oct 2019 10:30:43 -0000 1.191
+++ proprietary-back-doors.ru.po 19 Oct 2019 10:01:33 -0000 1.192
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-04 07:55+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -652,6 +653,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary-surveillance.de-diff.html 3 Oct 2019 10:32:23 -0000
1.98
+++ proprietary-surveillance.de-diff.html 19 Oct 2019 10:01:33 -0000
1.99
@@ -967,6 +967,26 @@
</div>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201909091">
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
@@ -3581,7 +3601,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/03 10:32:23 $
+$Date: 2019/10/19 10:01:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.313
retrieving revision 1.314
diff -u -b -r1.313 -r1.314
--- proprietary-surveillance.de.po 3 Oct 2019 10:32:23 -0000 1.313
+++ proprietary-surveillance.de.po 19 Oct 2019 10:01:33 -0000 1.314
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1969,6 +1969,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
"move/2270305001/\"> tracks users even when it is turned off</a>, after "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-surveillance.es.po 4 Oct 2019 08:49:16 -0000 1.6
+++ proprietary-surveillance.es.po 19 Oct 2019 10:01:33 -0000 1.7
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-10-04 10:39+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -1479,6 +1480,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
"move/2270305001/\"> tracks users even when it is turned off</a>, after "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.479
retrieving revision 1.480
diff -u -b -r1.479 -r1.480
--- proprietary-surveillance.fr.po 3 Oct 2019 11:13:15 -0000 1.479
+++ proprietary-surveillance.fr.po 19 Oct 2019 10:01:33 -0000 1.480
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-10-03 13:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1476,6 +1477,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
"move/2270305001/\"> tracks users even when it is turned off</a>, after "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary-surveillance.it-diff.html 3 Oct 2019 10:32:23 -0000
1.165
+++ proprietary-surveillance.it-diff.html 19 Oct 2019 10:01:33 -0000
1.166
@@ -1078,19 +1078,17 @@
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>this is used for repression</em></ins></span> of
<span class="removed"><del><strong>its phones. The app will give Verizon the
same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ <p>The fact</em></ins></span> that <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
+ makes</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
+
+ <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The
app will give Verizon</strong></del></span> <span
class="inserted"><ins><em>nonfree software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for</em></ins></span> the <span class="removed"><del><strong>users'
searches that Google normally gets when
they use its search engine.</p>
- <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
<span class="inserted"><ins><em>not a cure for</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>injustice of
nonfree software. It may avoid
- paying for</em></ins></span> the <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.</p>
</li>
</ul>
@@ -1100,204 +1098,228 @@
</div>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="inserted"><ins><em>Great Nation”</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
+ internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>Android version was found to contain a
+ back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="inserted"><ins><em>users'
+ phone, as “superusers.”(1) Downloading and using
this</em></ins></span>
+ app <span class="removed"><del><strong>remains spyware—an
“optional” piece of spyware</strong></del></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app</strong></del></span> <span class="inserted"><ins><em>mandatory at some
workplaces.</p>
+
+ <p>(1) The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes
a
+ clarification saying that the tests were</em></ins></span> only
+ <span class="removed"><del><strong>can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>performed</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>the
+ Android version</em></ins></span> of <span
class="removed"><del><strong>data in</strong></del></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201909091">
- <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>takes effect. However,</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving</em></ins></span> the app <span
class="removed"><del><strong>remains spyware—an “optional”
piece</strong></del></span> <span class="inserted"><ins><em>broad permissions
in order to use one</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>its
+ <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>,</em></ins></span> after
<span class="inserted"><ins><em>tricking them
+ into giving</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging</strong></del></span> app
<span class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>broad permissions in order to use one of its
functionalities.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span>
<span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA Fem and
Maya</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.</p>
+ </li>
+
+ <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>Maya</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take
according</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
send intimate details of users' lives</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201909060">
- <p>Keeping track of who downloads</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can</strong></del></span> <span class="inserted"><ins><em>proprietary
- program is a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle
sight.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list</em></ins></span> of <span
class="removed"><del><strong>data in</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
- alter them too</a>.
- </p></li>
+ <p>Keeping track of</em></ins></span> who <span
class="inserted"><ins><em>downloads a proprietary
+ program</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>list of all</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not be a list of who has installed
+ <p>With a free program there would not</em></ins></span> be
+ <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has
installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of</em></ins></span> the <span class="removed"><del><strong>user's
consent”
- for surveillance is inadequate</strong></del></span> <span
class="inserted"><ins><em>operating system, in order to
gather</em></ins></span> as <span class="removed"><del><strong>a
protection</strong></del></span> <span class="inserted"><ins><em>much private
data as
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
+ of <span class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>operating system, in
order</em></ins></span> to <span class="inserted"><ins><em>gather as much
private data as
they possibly can.</p>
- <p>Thus, we can't trust rules</em></ins></span> against <span
class="removed"><del><strong>massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>spying. What we can trust is
- having control over the software we run.</p></em></ins></span>
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>software we run.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
<span class="inserted"><ins><em><li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ users' movements even when the user says</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>, and some
+ are starting</strong></del></span> <span class="inserted"><ins><em>allow
them access</em></ins></span> to <span class="removed"><del><strong>realize
that it is nasty.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p></em></ins></span>
- <p>This involves an apparently unintentional weakness in Android,
+ <p>This <span class="removed"><del><strong>article shows
the</strong></del></span> <span class="inserted"><ins><em>involves an
apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ <p>It snoops on users, too,</em></ins></span> as <span
class="inserted"><ins><em>you must expect from nonfree
+ programs.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
- <p>This app is a spyware that can</em></ins></span> snoop on <span
class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>contact list,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p>
+ <p>Out, out, damned Spotify!</p>
</li>
-
- <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>has</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ <li><p>Many</strong></del></span> proprietary <span
class="removed"><del><strong>apps for mobile devices report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>phone
app</a> to be allowed into</em></ins></span>
+ the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>event.</p>
+
+ <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
+ sensitive data, including user's location</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
</li>
- <li id="M201904131">
- <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>picture you
take according</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily be
- traced back</em></ins></span> to <span class="inserted"><ins><em>the
woman</em></ins></span> who
- <span class="removed"><del><strong>is in</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
-
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span class="inserted"><ins><em>has
harmful implications for women's rights</em></ins></span> to <span
class="removed"><del><strong>some
- known-faces database, which means the pictures are
likely</strong></del></span> <span class="inserted"><ins><em>equal employment
- and freedom</em></ins></span> to <span class="removed"><del><strong>be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>make
their own pregnancy choices. Don't use
- these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list,
and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p></em></ins></span>
</li>
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
- spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>you is
available from</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
+ <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
- <p>This article shows the</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
- a <span class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+
+ <p>The FTC criticized this</strong></del></span> <span
class="inserted"><ins><em>women's rights to equal employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em>that does more or less</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>movements</em></ins></span> of <span
class="inserted"><ins><em>Android phones and iPhones
+ <p>Google tracks the movements of Android phones and iPhones
running Goggle apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
- optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible</em></ins></span> for
<span class="removed"><del><strong>children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>sending
- the location data to Google.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ saves the data for years</a>.</p>
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree</em></ins></span> apps <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="inserted"><ins><em>to user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get
- users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>control.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive</em></ins></span> personal data to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it <span class="removed"><del><strong>to other companies.
This shows the
- weakness</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ <p>Nonfree software in the phone has</em></ins></span> to
+ <span class="removed"><del><strong>approve</strong></del></span> <span
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span>
+ <span class="inserted"><ins><em>the location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ </li>
+
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="inserted"><ins><em>on</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access to
+ the network but no direct access to the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ </li>
+
+ <li id="M201903201">
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
+ send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send</strong></del></span> <span
class="inserted"><ins><em>understand. In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
+ lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
“consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
</li>
@@ -1351,14 +1373,15 @@
<p>The “smart” toys My Friend Cayla</strong></del></span>
<span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
<span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit <span class="inserted"><ins><em>the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
+ <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in on a child's speech,</strong></del></span>
<span class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>even speak
+ can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
into the toys themselves.</p>
</li>
@@ -1413,118 +1436,75 @@
<p>Following this lawsuit,
<a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span> <span
class="inserted"><ins><em>interface</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>most of them was designed</em></ins></span> to <span
class="removed"><del><strong>the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+ the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="inserted"><ins><em>potential risk because
- there is no easy</em></ins></span> way <span
class="removed"><del><strong>to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and</strong></del></span> <span
class="inserted"><ins><em>of knowing what they really do.</p>
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>their
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users. Other
technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="inserted"><ins><em><a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>not
really
-clean since</strong></del></span> <span class="inserted"><ins><em>unfortunate
that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ potentially also be used to spy on users. Other technical flaws
were</em></ins></span>
+ found <span class="inserted"><ins><em>as well.</p>
-<ul>
- <li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ <p>Moreover,</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
<li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>what
it will do
- with the data.</p>
+ <p>That</strong></del></span> <span class="inserted"><ins><em>users
of what it will do
+ with</em></ins></span> the <span class="removed"><del><strong>manufacturer
and</strong></del></span> <span class="inserted"><ins><em>data.</p>
- <p>We think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>FBI could listen
to these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span> <span
class="inserted"><ins><em>company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201812290">
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812290">
<p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
report on the user's actions to Facebook</a>.</p>
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>send the machine's “advertising ID,” so
that
- Facebook can correlate the data</em></ins></span> it <span
class="inserted"><ins><em>obtains from the same machine via
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
@@ -1552,17 +1532,15 @@
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens</em></ins></span> through <span
class="removed"><del><strong>Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the microphone</a>.</p>
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
<p>We expect it implements DRM, too—that there is no way to
save
a recording. But we can't be sure from the article.</p>
- <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
@@ -2176,7 +2154,7 @@
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
+ used a firmware “upgrade” to</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2216,7 +2194,7 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>place new items</strong></del></span>
<span class="inserted"><ins><em>report what the
user watches—no exceptions!</p>
</li>
@@ -2229,7 +2207,7 @@
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>other devices on the user's local
network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
@@ -2245,15 +2223,17 @@
Crackers found a way to break security on a “smart”
TV</a>
and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
@@ -2296,50 +2276,80 @@
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it
into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data
to a data
broker, the data broker would have been able to figure out who the
user was.</p>
@@ -3349,7 +3359,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/03 10:32:23 $
+$Date: 2019/10/19 10:01:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- proprietary-surveillance.it.po 3 Oct 2019 10:32:23 -0000 1.326
+++ proprietary-surveillance.it.po 19 Oct 2019 10:01:33 -0000 1.327
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1902,6 +1902,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
"move/2270305001/\"> tracks users even when it is turned off</a>, after "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-surveillance.ja-diff.html 3 Oct 2019 10:32:23 -0000
1.181
+++ proprietary-surveillance.ja-diff.html 19 Oct 2019 10:01:34 -0000
1.182
@@ -1019,28 +1019,15 @@
scans your mobile phone's photo collections for known faces</a>,
and suggests you to share the picture you take
according</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>running it</a>. The result is
- often a legal threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore,</strong></del></span> <span
class="inserted"><ins><em>money.</p>
+ reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>more vicious.</p>
+ makes it even more vicious.</p></em></ins></span>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>injustice of nonfree
software. It may avoid
- paying for</em></ins></span> the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015</strong></del></span> <span class="inserted"><ins><em>nasty thing,
but cannot make</em></ins></span> it <span class="inserted"><ins><em>less
nasty.</p>
+ <p>This <span class="removed"><del><strong>spyware feature
seems</strong></del></span> <span class="inserted"><ins><em>illustrates that
making unauthorized copies of nonfree software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
</ul>
@@ -1050,6 +1037,37 @@
</div>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"></em></ins></span>
+ access to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
+ internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>Android version was found</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers</strong></del></span> <span
class="inserted"><ins><em>contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading</em></ins></span> and
<span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>article</a>
(partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>tests
were only performed</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>the
+ Android version of the app,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>that,
according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201909091">
<p>The Facebook app</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
@@ -1074,18 +1092,17 @@
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program</em></ins></span> is a <span class="removed"><del><strong>typical
example</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of
- <span class="removed"><del><strong>the attitude of
the</strong></del></span> <span class="inserted"><ins><em>surveillance. There
is a</em></ins></span>
- proprietary <span class="removed"><del><strong>software industry towards
- those they have subjugated.</p>
+ program</em></ins></span> is a <span class="removed"><del><strong>typical
example</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="inserted"><ins><em>surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>list</em></ins></span> of <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they</strong></del></span> <span class="inserted"><ins><em>10,000
or more people
+ who</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
<p>Out, out, damned Spotify!</p>
</li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>adjusting a
certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>list of all the 10,000 or more people
- who have installed it</a>.</p>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps the user</strong></del></span> <span
class="inserted"><ins><em>installed it</a>.</p>
<p>With a free program there would not be a list of
who</em></ins></span> has
<span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>installed
@@ -1181,27 +1198,16 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>that does more
or less the same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>that does more or less</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage to spy through it
too</a>.
+ Here's information</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying</em></ins></span> on <span class="inserted"><ins><em>you is
available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
More about NSA app spying</a>.</p>
@@ -1216,68 +1222,113 @@
<ul>
- <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued</strong></del></span> <span class="inserted"><ins><em>be
responsible</em></ins></span> for <span class="removed"><del><strong>collecting
lots</strong></del></span> <span class="inserted"><ins><em>sending
- the location data to Google.</p>
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is</em></ins></span> being <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>developed</a>.</p>
</li>
- <li id="M201903251">
- <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>personal information about how
+ <li id="M201904130">
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
people use it</a>.</p>
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the</strong></del></span> <span
class="inserted"><ins><em>have access to sensitive</em></ins></span> data <span
class="inserted"><ins><em>without
- users' knowledge</a>. These hidden apps</em></ins></span> may <span
class="removed"><del><strong>be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>either call home with
- the data, or pass</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>a
- data broker,</strong></del></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>data. This results in
massive
- surveillance on which</em></ins></span> the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>has absolutely no control.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control app</a>.</p>
+ <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em>Android phones
and iPhones
+ running Goggle apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
+
+ <p>Nonfree software in the phone has to</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it sells</strong></del></span> <span class="inserted"><ins><em>responsible
for sending</em></ins></span>
+ the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ </li>
+
+ <li id="M201903251">
+ <p>Many Android phones come with</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker can
figure out who the user is.</p>
+ </li>
+
+ <li><p>A computerized
+ vibrator</strong></del></span> <span class="inserted"><ins><em>huge
number of</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps that have access
to</em></ins></span>
+ the <span class="removed"><del><strong>proprietary control
app</a>.</p>
- <p>The app reports the temperature</strong></del></span>
+ <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201903201">
+ <li id="M201903201">
<p>A study of 24 “health” apps found that 19 of them
<a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
+ <p>Whenever user “consent” is sought,</em></ins></span>
it is <span class="removed"><del><strong>surrounded by</strong></del></span>
<span class="inserted"><ins><em>buried in
lengthy terms of service that are difficult to understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
<li id="M201902230">
- <p>Facebook offered a convenient proprietary
+ <p>Facebook offered</em></ins></span> a <span
class="removed"><del><strong>person's
+ body),</strong></del></span> <span class="inserted"><ins><em>convenient
proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
+ way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>personal
+ data they collected</em></ins></span> would <span
class="removed"><del><strong>make statements about
+ their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>go to Facebook as
well.</p>
+
+ <p>It shows that no one</em></ins></span> can <span
class="removed"><del><strong>check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information</em></ins></span> on
<span class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
</li>
+</ul>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>total) link this ID to hardware
identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is in apparent violation of
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>in apparent
violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
@@ -1286,51 +1337,126 @@
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span class="inserted"><ins><em>them
was designed to make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
+ <p>Users should of course uninstall these dangerous apps
if</em></ins></span> they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span>
+ <span class="inserted"><ins><em>haven't yet, but they should also stay
away from nonfree apps</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201902010">
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
+ potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+ the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
+
+ <p>It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
</li>
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
+ stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>will do
with the data.</p>
<p>We think that lawsuit is about a side issue. What the company does
@@ -1339,110 +1465,204 @@
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
tracking people's locations.</p>
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not</strong></del></span>
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span
class="inserted"><ins><em>say that</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>has a Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>users that have deleted
them</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect it implements DRM, too—that there is no way to
save
- a recording. But we can't be sure from the article.</p>
+ <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
+
+ <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article,</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ <p>This</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of</strong></del></span> <span
class="inserted"><ins><em>evidence that</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>apps generally work against
+ their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
+ need to get rid of</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
+ Android</em></ins></span> by <span class="removed"><del><strong>malware.
The other
+ cases mentioned are done by proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em><a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,</em></ins></span>
+ and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary apps by
getting apps from the free software
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ the user</em></ins></span> if <span class="inserted"><ins><em>an app
contains anti-features</a>.</p>
</li>
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>get the data
+ and hand it over, the state can store it.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+ <span class="inserted"><ins><em>other but not</em></ins></span> to <span
class="inserted"><ins><em>the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ <p>The moviepass app and dis-service</em></ins></span>
+ spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p>
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201711240">
- <p>Tracking software in popular Android apps
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+ follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up to me</strong></del></span> <span class="inserted"><ins><em>physical
store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ uploads all phone numbers</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
+ book to developer's server. Note</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart” TVs <a href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't
expect</strong></del></span> this <span class="removed"><del><strong>has got
better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring</em></ins></span> to <span class="removed"><del><strong>get
users' formal
+ consent before collecting personal data</strong></del></span> <span
class="inserted"><ins><em>zero price.</p>
</li>
<li id="M201707270">
@@ -1458,22 +1678,24 @@
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ <a
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
+ are <span class="removed"><del><strong>totally inadequate.
+ And</strong></del></span> <span
class="inserted"><ins><em>malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
+ to inspect executable proprietary apps to see</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
+ various ways. If it did</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>good job of
this, it could more or less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ Google to protect us. We must demand release of source
code</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p>
</li>
<li id="M201705230">
@@ -1490,8 +1712,11 @@
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by</em></ins></span>
TV <span class="removed"><del><strong>will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
@@ -1504,10 +1729,10 @@
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
+ the app</em></ins></span> would <span
class="removed"><del><strong>say</strong></del></span> <span
class="inserted"><ins><em>record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
@@ -2147,177 +2372,40 @@
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
- <p>The app was reporting the temperature</em></ins></span> of the
vibrator minute by
- minute (thus, indirectly, whether it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
- body), <span class="removed"><del><strong>and</strong></del></span> <span
class="inserted"><ins><em>as well as</em></ins></span> the vibration
frequency.</p>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users <span
class="removed"><del><strong>can check
- and change.</p>
- </li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ products, rather than free software which users could have checked
+ and changed.</p>
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>could have
checked
- and changed.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>company that made</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but it doesn't really matter. If</em></ins></span> it <span
class="inserted"><ins><em>had sold the data</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the
- user <span class="removed"><del><strong>reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>was.</p>
-
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>pay a total
of C$4m</a></em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>its
- customers.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>nonfree software are</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
- effectively
- anyone</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to</em></ins></span> access <span
class="removed"><del><strong>its computers remotely</strong></del></span> <span
class="inserted"><ins><em>the data</a> collected by the
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
+ </li>
+
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>these
+ <p>That the manufacturer and the FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
@@ -2325,15 +2413,12 @@
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
<li id="M201502180">
@@ -2352,10 +2437,8 @@
<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI</em></ins></span> is
- <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>in many cases</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2369,182 +2452,121 @@
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when</em></ins></span> it <span class="removed"><del><strong>demands blind
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to
listen</a>. Thus, when one of Google's
+ when it is not supposed to listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
- users were easily identified</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
+ users were easily identified from these recordings.</p>
- <p>Even if</strong></del></span> <span
class="inserted"><ins><em>these recordings.</p>
+ <p>Since Google “Assistant” uses proprietary software,
there is no
+ way to see or control what it records or sends.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is</em></ins></span> no <span class="removed"><del><strong>one
connects</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>see or control what it records or sends.</p>
-
- <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
- get commands that</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905061">
- <p>Amazon Alexa collects a lot more</em></ins></span> information
<span class="removed"><del><strong>about drivers' movements</a>,
- which</strong></del></span> <span class="inserted"><ins><em>from users
- than</em></ins></span> is <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
- recordings</em></ins></span> made <span
class="removed"><del><strong>available to car manufacturers, insurance
companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>sends
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be accessed</em></ins></span> by <span
class="removed"><del><strong>malware. The</strong></del></span>
- <span class="inserted"><ins><em>advertising companies and government
agencies. In</em></ins></span> other
- <span class="removed"><del><strong>cases mentioned</strong></del></span>
<span class="inserted"><ins><em>words,
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices</em></ins></span> are <span class="removed"><del><strong>done
by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>tethered to. Moreover, they are made available to
+ the devices are tethered to. Moreover, they are made available to
Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
+ at home, not only in the present, but in the past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>).</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>.</em></ins></span>
The <span class="removed"><del><strong>company says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>Google and Apple
+ <p>Some of users' commands to the Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span>
to <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>A fraction of the Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data
<span class="inserted"><ins><em>processing is done
+ <p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>where it's
done”), users have no way
- to know what happens to</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
+ break their non-disclosure agreements</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS:</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902080">
+ <li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>the user is still
- paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
- <span class="inserted"><ins><em>paid for.</p>
-
- <p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
</li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+ <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
+ paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
+ specific cases, it spies</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>users, and
involves totally unacceptable
+ restrictions</em></ins></span> in <span
class="removed"><del><strong>detail</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>device,
- and</em></ins></span> <a <span class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way to break the security of an Amazon
device,</em></ins></span>
+ and
+ <span class="removed"><del><strong>link</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+ <p>It was very difficult for</em></ins></span> them <span
class="removed"><del><strong>your IP address</a> so</strong></del></span>
<span class="inserted"><ins><em>to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>advertisers can
track</strong></del></span> <span class="inserted"><ins><em>country,
+ do</em></ins></span> you
+ <span class="removed"><del><strong>across devices.</p>
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>think Amazon would have the moral
fiber</em></ins></span> to <span class="removed"><del><strong>turn this
off,</strong></del></span> <span class="inserted"><ins><em>say no?</p>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
-
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ <p>These crackers are probably hackers too,</em></ins></span> but
<span class="removed"><del><strong>having it enabled</strong></del></span>
<span class="inserted"><ins><em>please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
+ <li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
- sending usage data back over the Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
- <li id="M201706204">
- <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706204">
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
- link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
+ listen</em></ins></span> to <span class="inserted"><ins><em>everyone
in</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
- across devices.</p>
-
- <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
- on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
+ a device that</em></ins></span> can <span
class="removed"><del><strong>now</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
+ <li id="M201407170">
<p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all users to
new combined surveillance by default.</p></li>
@@ -3196,7 +3218,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/03 10:32:23 $
+$Date: 2019/10/19 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary-surveillance.ja.po 3 Oct 2019 10:32:23 -0000 1.307
+++ proprietary-surveillance.ja.po 19 Oct 2019 10:01:34 -0000 1.308
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1426,6 +1426,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
"move/2270305001/\"> tracks users even when it is turned off</a>, after "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary-surveillance.pot 3 Oct 2019 10:32:23 -0000 1.247
+++ proprietary-surveillance.pot 19 Oct 2019 10:01:34 -0000 1.248
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1036,6 +1036,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as “superusers.”(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, “this kind of ‘superuser’ surveillance "
+"could not be conducted on Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a "
"href=\"https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/\">
"
"tracks users even when it is turned off</a>, after tricking them into giving "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.573
retrieving revision 1.574
diff -u -b -r1.573 -r1.574
--- proprietary-surveillance.ru.po 3 Oct 2019 11:00:59 -0000 1.573
+++ proprietary-surveillance.ru.po 19 Oct 2019 10:01:34 -0000 1.574
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-03 10:26+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1462,6 +1463,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
"move/2270305001/\"> tracks users even when it is turned off</a>, after "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary.de-diff.html 16 Oct 2019 07:30:05 -0000 1.132
+++ proprietary.de-diff.html 19 Oct 2019 10:01:34 -0000 1.133
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -46,13 +46,13 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -85,8 +85,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of April, <span
class="removed"><del><strong>2017,</strong></del></span> <span
class="inserted"><ins><em>2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 450 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -131,16 +131,16 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
+<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
-<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -188,6 +188,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201910070">
<p>Apple <a
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
@@ -231,14 +251,6 @@
run nonfree apps. They can never be completely sure that a nonfree
app is safe.</p>
</li>
-
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
- </li>
</ul></em></ins></span>
@@ -300,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary.de.po 16 Oct 2019 07:30:05 -0000 1.174
+++ proprietary.de.po 19 Oct 2019 10:01:34 -0000 1.175
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -98,19 +98,19 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
"aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -455,6 +455,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -506,15 +531,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.es.po 16 Oct 2019 11:13:06 -0000 1.230
+++ proprietary.es.po 19 Oct 2019 10:01:34 -0000 1.231
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -88,10 +89,19 @@
"de ser engañado."
#. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Hasta abril de 2019, las páginas de este directorio ofrecÃan una lista de "
"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
@@ -312,6 +322,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -392,20 +427,6 @@
"ejecutan aplicaciones que no son libres. Nunca pueden tener la certeza de "
"que una aplicación privativa sea segura."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"La aplicación de Facebook <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\">rastrea a los usuarios incluso cuando está cerrada</a>, "
-"tras haberles embaucado para que den a la aplicación amplios permisos a fin "
-"de utilizar una de sus funcionalidades."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -483,6 +504,19 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "La aplicación de Facebook <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\">rastrea a los usuarios incluso cuando está cerrada</"
+#~ "a>, tras haberles embaucado para que den a la aplicación amplios permisos
"
+#~ "a fin de utilizar una de sus funcionalidades."
+
+#~ msgid ""
#~ "The recent versions of Microsoft Office require the user to <a href="
#~ "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-"
#~ "faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary.fr.po 16 Oct 2019 10:47:19 -0000 1.278
+++ proprietary.fr.po 19 Oct 2019 10:01:34 -0000 1.279
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-10-16 12:46+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -86,10 +87,19 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"En avril 2019, les pages de ce répertoire dénombraient à peu près 400 cas
de "
"fonctionnalités malveillante (appuyés par plus de 450 références), mais
il y "
@@ -308,6 +318,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -387,20 +422,6 @@
"appli non libre. Ils ne peuvent jamais être complètement sûrs qu'elle est "
"sans danger."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"L'appli de Facebook <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\">piste les utilisateurs même quand elle n'est pas
activée</"
-"a>, après les avoir incités à lui donner des permissions très étendues
pour "
-"utiliser une de ses fonctionnalités"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,3 +494,16 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "L'appli de Facebook <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\">piste les utilisateurs même quand elle n'est pas "
+#~ "activée</a>, après les avoir incités à lui donner des permissions
très "
+#~ "étendues pour utiliser une de ses fonctionnalités"
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary.it-diff.html 16 Oct 2019 07:30:05 -0000 1.144
+++ proprietary.it-diff.html 19 Oct 2019 10:01:35 -0000 1.145
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -85,8 +85,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of April, <span
class="removed"><del><strong>2017,</strong></del></span> <span
class="inserted"><ins><em>2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 450 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -187,6 +187,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201910070">
<p>Apple <a
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
@@ -230,14 +250,6 @@
run nonfree apps. They can never be completely sure that a nonfree
app is safe.</p>
</li>
-
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
- </li>
</ul></em></ins></span>
@@ -299,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary.it.po 16 Oct 2019 07:30:05 -0000 1.183
+++ proprietary.it.po 19 Oct 2019 10:01:35 -0000 1.184
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -94,19 +94,19 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
"ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -459,6 +459,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -510,15 +535,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.ja-diff.html 16 Oct 2019 07:30:05 -0000 1.147
+++ proprietary.ja-diff.html 19 Oct 2019 10:01:35 -0000 1.148
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -81,8 +81,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>April,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 450 references to
+<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -129,11 +129,11 @@
</td>
<td>
<ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -185,6 +185,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201910070">
<p>Apple <a
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
@@ -228,14 +248,6 @@
run nonfree apps. They can never be completely sure that a nonfree
app is safe.</p>
</li>
-
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
- </li>
</ul></em></ins></span>
@@ -297,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.ja.po 16 Oct 2019 07:30:05 -0000 1.167
+++ proprietary.ja.po 19 Oct 2019 10:01:35 -0000 1.168
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -91,9 +91,9 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
"ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
@@ -319,6 +319,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -370,15 +395,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.nl-diff.html 16 Oct 2019 07:30:05 -0000 1.145
+++ proprietary.nl-diff.html 19 Oct 2019 10:01:35 -0000 1.146
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -85,8 +85,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of April, <span
class="removed"><del><strong>2017,</strong></del></span> <span
class="inserted"><ins><em>2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 450 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -187,6 +187,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201910070">
<p>Apple <a
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
@@ -230,14 +250,6 @@
run nonfree apps. They can never be completely sure that a nonfree
app is safe.</p>
</li>
-
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
- </li>
</ul></em></ins></span>
@@ -299,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary.nl.po 16 Oct 2019 07:30:05 -0000 1.157
+++ proprietary.nl.po 19 Oct 2019 10:01:35 -0000 1.158
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -94,19 +94,19 @@
"je meestal belazerd."
#. type: Content of: <p>
-# | As of April, 2019, the [-files-] {+pages+} in this directory list around
-# | 400 instances of malicious [-functionalities,-] {+functionalities (with
-# | more than 450 references to back them up),+} but there are surely
-# | thousands more we don't know about.
+# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
+# | directory list around 400 instances of malicious [-functionalities,-]
+# | {+functionalities (with more than 500 references to back them up),+} but
+# | there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2019, the files in this directory list around 400 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
"kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
@@ -361,6 +361,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -412,15 +437,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.pl-diff.html 16 Oct 2019 07:30:05 -0000 1.162
+++ proprietary.pl-diff.html 19 Oct 2019 10:01:35 -0000 1.163
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
+<p>As of October, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 500
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -185,6 +185,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201910070">
<p>Apple <a
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
@@ -228,14 +248,6 @@
run nonfree apps. They can never be completely sure that a nonfree
app is safe.</p>
</li>
-
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
- </li>
</ul></em></ins></span>
@@ -297,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.pl.po 16 Oct 2019 07:30:05 -0000 1.150
+++ proprietary.pl.po 19 Oct 2019 10:01:35 -0000 1.151
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -135,9 +135,9 @@
#. type: Content of: <p>
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
#. type: Content of: <table><tr><th>
@@ -540,6 +540,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -591,15 +616,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary.pot 16 Oct 2019 07:30:05 -0000 1.147
+++ proprietary.pot 19 Oct 2019 10:01:35 -0000 1.148
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -70,9 +70,9 @@
#. type: Content of: <p>
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
#. type: Content of: <table><tr><th>
@@ -257,6 +257,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a "
+"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a "
+"back-door allowing developers to run any code they wish in the users' phone, "
+"as “superusers.”(1) Downloading and using this app is mandatory "
+"at some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a "
+"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
+"Washington Post version of the article</a> (partly obfuscated, but readable "
+"after copy-pasting in a text editor) includes a clarification saying that "
+"the tests were only performed on the Android version of the app, and that, "
+"according to Apple, “this kind of ‘superuser’ surveillance "
+"could not be conducted on Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a "
"href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html\">
"
"censors the Taiwan flag in iOS</a> on behalf of the Chinese government. When "
@@ -309,14 +332,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a "
-"href=\"https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/\">
"
-"tracks users even when it is turned off</a>, after tricking them into giving "
-"the app broad permissions in order to use one of its functionalities."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary.pt-br.po 17 Oct 2019 05:59:32 -0000 1.240
+++ proprietary.pt-br.po 19 Oct 2019 10:01:35 -0000 1.241
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-10-17 02:11-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -84,10 +85,15 @@
"de ser mal."
#. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Até abril de 2019, as páginas neste diretório listam quase 400 exemplos de
"
"funcionalidades maliciosas (com mais de 450 referências para confirmá-las),
"
@@ -305,6 +311,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -384,20 +415,6 @@
"aplicativos não livres. Eles nunca podem ter certeza absoluta de que um "
"aplicativo não livre é seguro."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"O aplicativo do Facebook <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> rastreia os usuários mesmo quando está desativado</a>, "
-"depois de induzi-los a conceder amplas permissões ao aplicativo para usar "
-"uma de suas funcionalidades."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +490,19 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "O aplicativo do Facebook <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> rastreia os usuários mesmo quando está desativado</"
+#~ "a>, depois de induzi-los a conceder amplas permissões ao aplicativo para "
+#~ "usar uma de suas funcionalidades."
+
+#~ msgid ""
#~ "The recent versions of Microsoft Office require the user to <a href="
#~ "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-"
#~ "faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary.ru.po 16 Oct 2019 14:28:34 -0000 1.311
+++ proprietary.ru.po 19 Oct 2019 10:01:36 -0000 1.312
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-19 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,10 +89,19 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Ðа апÑÐµÐ»Ñ 2019 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 400 "
"пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более 450
ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), но "
@@ -311,6 +321,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -390,20 +425,6 @@
"ÑабоÑаÑÑ Ñ Ð½ÐµÑвободнÑми пÑиложениÑми. Ðни
никогда не могÑÑ Ð±ÑÑÑ Ð¿Ð¾Ð»Ð½Ð¾ÑÑÑÑ "
"ÑвеÑеннÑми, ÑÑо неÑвободное пÑиложение
безопаÑно."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-"ÐÑиложение Facebook <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей,
даже когда оно вÑклÑÑено</a>, "
-"поÑле Ñого как обманом вÑнÑдиÑ
пÑедоÑÑавиÑÑ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑиÑокие пÑава "
-"доÑÑÑпа, ÑÑÐ¾Ð±Ñ Ð¸ÑполÑзоваÑÑ Ð¾Ð´Ð½Ñ Ð¸Ð· его
ÑÑнкÑий."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -482,6 +503,19 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> tracks users even when it is turned off</a>, after "
+#~ "tricking them into giving the app broad permissions in order to use one "
+#~ "of its functionalities."
+#~ msgstr ""
+#~ "ÐÑиложение Facebook <a
href=\"https://eu.usatoday.com/story/tech/"
+#~ "talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
+#~ "move/2270305001/\"> оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей,
даже когда оно вÑклÑÑено</"
+#~ "a>, поÑле Ñого как обманом вÑнÑдиÑ
пÑедоÑÑавиÑÑ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑиÑокие пÑава "
+#~ "доÑÑÑпа, ÑÑÐ¾Ð±Ñ Ð¸ÑполÑзоваÑÑ Ð¾Ð´Ð½Ñ Ð¸Ð· его
ÑÑнкÑий."
+
+#~ msgid ""
#~ "The recent versions of Microsoft Office require the user to <a href="
#~ "\"https://products.office.com/en-us/microsoft-office-for-home-and-school-"
#~ "faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.zh-tw-diff.html 16 Oct 2019 07:30:05 -0000 1.124
+++ proprietary.zh-tw-diff.html 19 Oct 2019 10:01:36 -0000 1.125
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -46,13 +46,13 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -85,8 +85,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of April, <span
class="removed"><del><strong>2017,</strong></del></span> <span
class="inserted"><ins><em>2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 450 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -131,16 +131,16 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
+<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
-<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -188,6 +188,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.”(1) Downloading and using this
+ app is mandatory at some workplaces.</p>
+
+ <p>(1) The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated,
+ but readable after copy-pasting in a text editor) includes a
+ clarification saying that the tests were only performed on the
+ Android version of the app, and that, according to Apple, “this
+ kind of ‘superuser’ surveillance could not be conducted
+ on Apple's operating system.”</p>
+ </li>
+
<li id="M201910070">
<p>Apple <a
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html">
@@ -231,14 +251,6 @@
run nonfree apps. They can never be completely sure that a nonfree
app is safe.</p>
</li>
-
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
- </li>
</ul></em></ins></span>
@@ -300,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/16 07:30:05 $
+$Date: 2019/10/19 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.zh-tw.po 16 Oct 2019 07:30:06 -0000 1.135
+++ proprietary.zh-tw.po 19 Oct 2019 10:01:36 -0000 1.136
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-16 07:25+0000\n"
+"POT-Creation-Date: 2019-10-19 09:55+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -89,19 +89,19 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
"æä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
@@ -433,6 +433,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the Chinese "
"government. When the region is set to Hong Kong, this flag is not visible in "
@@ -484,15 +509,6 @@
"nonfree apps. They can never be completely sure that a nonfree app is safe."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Facebook app <a href=\"https://eu.usatoday.com/story/tech/"
-"talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-"
-"move/2270305001/\"> tracks users even when it is turned off</a>, after "
-"tricking them into giving the app broad permissions in order to use one of "
-"its functionalities."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- pt-br.po 17 Oct 2019 05:59:33 -0000 1.193
+++ pt-br.po 19 Oct 2019 10:01:36 -0000 1.194
@@ -667,10 +667,6 @@
"<em>Tiranos</em> sistema que rejeita qualquer sistema operacional não "
"âautorizadoâ pelo fabricante."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -725,7 +721,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
msgstr ""
#. type: Content of: <p>
@@ -735,10 +731,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -784,7 +776,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -831,7 +823,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr ""
#. type: Content of: <p>
@@ -903,7 +895,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
msgstr ""
#. type: Content of: <p>
@@ -928,7 +920,7 @@
"</a>"
#. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
msgstr ""
#. type: Content of: <p>
@@ -1150,7 +1142,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1169,7 +1161,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr ""
#. type: Content of: <p>
@@ -1187,7 +1179,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr ""
#. type: Content of: <p>
@@ -1329,8 +1321,29 @@
"apparently intentional."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1578,7 +1591,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6902,6 +6915,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -7657,15 +7693,15 @@
#, fuzzy
#| msgid ""
#| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 400 references to back them "
+#| "of malicious functionalities (with more than 450 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Até abril de 2019, as páginas neste diretório listam quase 400 exemplos de
"
-"funcionalidades maliciosas (com mais de 400 referências para confirmá-las),
"
+"funcionalidades maliciosas (com mais de 450 referências para confirmá-las),
"
"mas com certeza há mais milhares das quais nós não temos conhecimento."
#. type: Content of: <table><tr><th>
@@ -8849,6 +8885,21 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> "
"Processadores da Intel terão software tirano embutido</a>."
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 400 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até abril de 2019, as páginas neste diretório listam quase 400 exemplos
"
+#~ "de funcionalidades maliciosas (com mais de 400 referências para
confirmá-"
+#~ "las), mas com certeza há mais milhares das quais nós não temos "
+#~ "conhecimento."
+
#~ msgid ""
#~ "The article focuses on a further nasty fillip, that sales of the broken "
#~ "devices continued. But I think that is a secondary issue; it made the "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- ru.po 16 Oct 2019 13:56:41 -0000 1.319
+++ ru.po 19 Oct 2019 10:01:37 -0000 1.320
@@ -729,10 +729,6 @@
"лÑбÑÑ Ð¾Ð¿ÐµÑаÑионнÑÑ ÑиÑÑемÑ, кÑоме
“ÑанкÑиониÑованнÑÑ
” "
"пÑоизводиÑелем."
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr "Ðазейки"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -804,7 +800,10 @@
"влаÑÑÑÑ, поÑÐ¾Ð¼Ñ ÑÑо мÑ, конеÑно, можем
довеÑÑÑÑ Apple."
#. type: Content of: <h3>
-msgid "Apple Censorship"
+# | [-Apple-]Censorship
+#, fuzzy
+#| msgid "Apple Censorship"
+msgid "Censorship"
msgstr "ЦензÑÑа"
#. type: Content of: <p>
@@ -817,10 +816,6 @@
"ÑÑÐ¾Ð±Ñ Ð½Ð°Ð»Ð°Ð³Ð°ÑÑ ÑензÑÑÑ Ð½Ð° Apple Store.
ÐодÑобнее Ñм. Ñаздел <a href=\"#jails"
"\">ТÑÑÑмÑ</a>."
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr "ЦиÑÑовое ÑпÑавление огÑаниÑениÑми"
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -888,7 +883,10 @@
"Ñвоим клиенÑам, на Ñем пÑоÑмаÑÑиваÑÑ
кÑпленнÑе ими видеоÑолики</a>."
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+# | [-Apple-]Incompatibility
+#, fuzzy
+#| msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr "ÐеÑовмеÑÑимоÑÑÑ"
#. type: Content of: <p>
@@ -959,7 +957,10 @@
"неподÑ
одÑÑими Ð´Ð»Ñ ÑоÑ
ÑанениÑ
докÑменÑов</a>."
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+# | [-Apple-]Insecurity
+#, fuzzy
+#| msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr "УÑзвимоÑÑÑ"
#. type: Content of: <p>
@@ -1044,7 +1045,10 @@
"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <h3>
-msgid "Apple Interference"
+# | [-Apple-]Interference
+#, fuzzy
+#| msgid "Apple Interference"
+msgid "Interference"
msgstr "ÐомеÑ
и"
#. type: Content of: <p>
@@ -1073,7 +1077,10 @@
"заменÑÑÑÑÑ ÐºÐµÐ¼-Ñо, кÑоме Apple.</a>"
#. type: Content of: <h3>
-msgid "Apple Jails"
+# | [-Apple-]Jails
+#, fuzzy
+#| msgid "Apple Jails"
+msgid "Jails"
msgstr "ТÑÑÑмÑ"
#. type: Content of: <p>
@@ -1147,19 +1154,19 @@
msgstr ""
"Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-"
"kong.html\"> подвеÑÐ³Ð°ÐµÑ ÑензÑÑе ÑайванÑÑкий
Ñлаг в iOS</a> Ð¾Ñ Ð¸Ð¼ÐµÐ½Ð¸ "
-"киÑайÑкого пÑавиÑелÑÑÑва. Ðогда в
каÑеÑÑве Ñегиона ÑÑÑаÑавливаеÑÑÑ
Ðонг-Ðонг, "
-"ÑÑÐ¾Ñ Ñлаг невидим в набоÑе Ñмодзи, но
вÑе-Ñаки доÑÑÑпен. Ðогда в каÑеÑÑве "
-"Ñегиона ÑÑÑанавливаеÑÑÑ ÐºÐ¾Ð½ÑиненÑалÑнÑй
ÐиÑай, вÑе попÑÑки оÑобÑÐ°Ð¶ÐµÐ½Ð¸Ñ "
-"пÑиводÑÑ Ðº пикÑогÑамме “пÑÑÑой
Ñмодзи”, как еÑли Ð±Ñ Ñлаг "
-"никогда не ÑÑÑеÑÑвовал."
+"киÑайÑкого пÑавиÑелÑÑÑва. Ðогда в
каÑеÑÑве Ñегиона ÑÑÑаÑавливаеÑÑÑ Ðонг-"
+"Ðонг, ÑÑÐ¾Ñ Ñлаг невидим в набоÑе Ñмодзи, но
вÑе-Ñаки доÑÑÑпен. Ðогда в "
+"каÑеÑÑве Ñегиона ÑÑÑанавливаеÑÑÑ
конÑиненÑалÑнÑй ÐиÑай, вÑе попÑÑки "
+"оÑобÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð¿ÑиводÑÑ Ðº пикÑогÑамме
“пÑÑÑой Ñмодзи”, как еÑли Ð±Ñ "
+"Ñлаг никогда не ÑÑÑеÑÑвовал."
#. type: Content of: <ul><li><p>
msgid ""
"Thus, not only does Apple use the App Store as an instrument of censorship, "
"it also uses the iThing operating system for that purpose."
msgstr ""
-"Таким обÑазом, Apple пÑименÑÐµÑ ÐºÐ°Ðº оÑÑдие
ÑензÑÑÑ Ð½Ðµ ÑолÑко App Store — "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзÑеÑÑÑ Ð² ÑеÑ
же ÑелÑÑ
и
опеÑаÑионной ÑиÑÑемой ай-ÑÑÑÑек."
+"Таким обÑазом, Apple пÑименÑÐµÑ ÐºÐ°Ðº оÑÑдие
ÑензÑÑÑ Ð½Ðµ ÑолÑко App Store "
+"— ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзÑеÑÑÑ Ð² ÑеÑ
же ÑелÑÑ
и
опеÑаÑионной ÑиÑÑемой ай-ÑÑÑÑек."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1376,7 +1383,10 @@
"drone-strikes/\">пÑизнала, ÑÑо ÑÑо ÑензÑÑа
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ ÑемаÑике</a>."
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+# | [-Apple-]Manipulation
+#, fuzzy
+#| msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr "ÐанипÑлÑÑиÑ"
#. type: Content of: <ul><li><p>
@@ -1402,7 +1412,10 @@
"поймеÑ, как же ÑÑо оÑклÑÑиÑÑ."
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+# | [-Apple-]Pressuring
+#, fuzzy
+#| msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr "Ðавление"
#. type: Content of: <p>
@@ -1427,7 +1440,10 @@
"попÑлÑÑноÑÑи мÑзÑки, еÑли Ð²Ñ Ð½Ðµ подпиÑанÑ
на Apple Music."
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+# | [-Apple-]Sabotage
+#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr "СабоÑаж"
#. type: Content of: <p>
@@ -1626,9 +1642,30 @@
"href=\"/proprietary/proprietary-jails.html\"> ÑензÑÑой Apple</a>.
ÐÑе ÑÑо, "
"по-видимомÑ, Ñделано пÑеднамеÑенно."
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
-msgstr "Слежка"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1971,7 +2008,10 @@
"поÑÑÑ Ð¸ полÑÑиÑÑ ÐºÐ¾Ð´, коÑоÑÑй поÑÑÐ»Ð°ÐµÑ Apple."
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+# | [-Apple-]Tyrants
+#, fuzzy
+#| msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr "ТиÑанÑ"
#. type: Content of: <ul><li><p>
@@ -8694,6 +8734,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -9678,10 +9741,19 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <p>
-msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-April,-] {+October,+} 2019, the pages in this directory list
+# | around 400 instances of malicious functionalities (with more than [-450-]
+# | {+500+} references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of April, 2019, the pages in this directory list around 400 instances "
+#| "of malicious functionalities (with more than 450 references to back them "
+#| "up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"Ðа апÑÐµÐ»Ñ 2019 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 400 "
"пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более 450
ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), но "
@@ -11045,6 +11117,51 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Ð "
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
+#~ msgid "Apple Back Doors"
+#~ msgstr "Ðазейки"
+
+#~ msgid "Apple Censorship"
+#~ msgstr "ЦензÑÑа"
+
+#~ msgid "Apple DRM"
+#~ msgstr "ЦиÑÑовое ÑпÑавление огÑаниÑениÑми"
+
+#~ msgid "Apple Incompatibility"
+#~ msgstr "ÐеÑовмеÑÑимоÑÑÑ"
+
+#~ msgid "Apple Insecurity"
+#~ msgstr "УÑзвимоÑÑÑ"
+
+#~ msgid "Apple Interference"
+#~ msgstr "ÐомеÑ
и"
+
+#~ msgid "Apple Jails"
+#~ msgstr "ТÑÑÑмÑ"
+
+#~ msgid "Apple Manipulation"
+#~ msgstr "ÐанипÑлÑÑиÑ"
+
+#~ msgid "Apple Pressuring"
+#~ msgstr "Ðавление"
+
+#~ msgid "Apple Sabotage"
+#~ msgstr "СабоÑаж"
+
+#~ msgid "Apple Surveillance"
+#~ msgstr "Слежка"
+
+#~ msgid "Apple Tyrants"
+#~ msgstr "ТиÑанÑ"
+
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Ðа апÑÐµÐ»Ñ 2019 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около "
+#~ "400 пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более
450 ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), "
+#~ "но еÑÑÑ, беÑÑпоÑно, ÑÑÑÑÑи дÑÑгиÑ
, о
коÑоÑÑÑ
Ð¼Ñ Ð½Ðµ знаем."
+
#~ msgid ""
#~ "Apple has <a href=\"https://www.theregister.co.uk/2019/10/02/"
#~ "apple_hong_kong/\"> banned the app that Hong Kong protesters use to "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- zh-tw.po 16 Oct 2019 07:30:06 -0000 1.149
+++ zh-tw.po 19 Oct 2019 10:01:37 -0000 1.150
@@ -654,10 +654,6 @@
"<a href=\"/proprietary/proprietary-tyrants.html\">æ´å
(Tyrant)</a>—æ"
"çµä»»ä½å» åæªææ¬ä½æ¥ç³»çµ±ç系統ã"
-#. type: Content of: <h3>
-msgid "Apple Back Doors"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
@@ -706,7 +702,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Censorship"
+msgid "Censorship"
msgstr ""
#. type: Content of: <p>
@@ -716,10 +712,6 @@
"section for more information."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple DRM"
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Apple is putting DRM on iPhone batteries, and the system proprietary "
@@ -765,7 +757,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Incompatibility"
+msgid "Incompatibility"
msgstr ""
#. type: Content of: <p>
@@ -812,7 +804,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Insecurity"
+msgid "Insecurity"
msgstr ""
#. type: Content of: <p>
@@ -868,7 +860,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Interference"
+msgid "Interference"
msgstr ""
#. type: Content of: <p>
@@ -888,7 +880,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Jails"
+msgid "Jails"
msgstr ""
#. type: Content of: <p>
@@ -1089,7 +1081,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Manipulation"
+msgid "Manipulation"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1108,7 +1100,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Pressuring"
+msgid "Pressuring"
msgstr ""
#. type: Content of: <p>
@@ -1126,7 +1118,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Sabotage"
+msgid "Sabotage"
msgstr ""
#. type: Content of: <p>
@@ -1258,8 +1250,29 @@
"apparently intentional."
msgstr ""
-#. type: Content of: <h3>
-msgid "Apple Surveillance"
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Chinese Communist Party's “Study the Great Nation” app "
+"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
+"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
+"access to the phone's microphone, photos, text messages, contacts, and "
+"internet history</a>, and the Android version was found to contain a back-"
+"door allowing developers to run any code they wish in the users' phone, as "
+"“superusers.”(1) Downloading and using this app is mandatory at "
+"some workplaces."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
+"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1483,7 +1496,7 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Apple Tyrants"
+msgid "Tyrants"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6038,6 +6051,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
+"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
+"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
+"allows-officials-access-to-100-million-users-phone-report-2115962\"> a back-"
+"door allowing developers to run any code they wish</a> in the users' phone, "
+"as “superusers.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
+"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
+"article</a> (partly obfuscated, but readable after copy-pasting in a text "
+"editor) includes a clarification saying that the tests were only performed "
+"on the Android version of the app, and that, according to Apple, “this "
+"kind of ‘superuser’ surveillance could not be conducted on "
+"Apple's operating system.”"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
@@ -6793,19 +6829,19 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <p>
-# | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
-# | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 450 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
+# | directory list around [-3-]{+4+}00 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of April, 2019, the pages in this directory list around 400 instances of "
-"malicious functionalities (with more than 450 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October, 2019, the pages in this directory list around 400 instances "
+"of malicious functionalities (with more than 500 references to back them "
+"up), but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
"æä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
@@ -8098,6 +8134,19 @@
"processors will have tyrant software built in</a>."
msgstr ""
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of April, 2019, the pages in this directory list around 400 instances "
+#~ "of malicious functionalities (with more than 450 references to back them "
+#~ "up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°"
+#~ "éæä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
+
#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/16
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/30
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/31