[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 31 Oct 2019 08:02:00 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/10/31 08:01:59
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.482&r2=1.483
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.309&r2=1.310
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.576&r2=1.577
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.155&r2=1.156
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- de.po 30 Oct 2019 17:00:13 -0000 1.155
+++ de.po 31 Oct 2019 12:01:57 -0000 1.156
@@ -1880,6 +1880,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- es.po 31 Oct 2019 09:59:52 -0000 1.219
+++ es.po 31 Oct 2019 12:01:57 -0000 1.220
@@ -1797,6 +1797,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- fr.po 30 Oct 2019 18:47:18 -0000 1.268
+++ fr.po 31 Oct 2019 12:01:57 -0000 1.269
@@ -1655,6 +1655,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- it.po 30 Oct 2019 17:00:14 -0000 1.155
+++ it.po 31 Oct 2019 12:01:57 -0000 1.156
@@ -1861,6 +1861,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- ja.po 30 Oct 2019 17:00:14 -0000 1.162
+++ ja.po 31 Oct 2019 12:01:57 -0000 1.163
@@ -1447,6 +1447,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-apple.de-diff.html 21 Oct 2019 07:00:13 -0000 1.53
+++ malware-apple.de-diff.html 31 Oct 2019 12:01:57 -0000 1.54
@@ -442,34 +442,26 @@
<p>Offering a checking service</em></ins></span> as <span
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>an option could be
useful and would not be wrong. Requiring users to get
- Apple's approval</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>tyranny. Apple
says</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span class="inserted"><ins><em>check
will
- only look for malware (not counting the malware that</em></ins></span> is
<span class="removed"><del><strong>a way to</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>,</strong></del></span>
+ Apple's approval is tyranny. Apple says the check will
+ only look for malware (not counting the malware that</em></ins></span> is
<a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html#TOC">part of
- the operating system</a>),</em></ins></span> but <span
class="removed"><del><strong>it's active</strong></del></span> <span
class="inserted"><ins><em>Apple could change that policy step</em></ins></span>
- by <span class="removed"><del><strong>default so it still counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>step. Or perhaps
Apple will define malware</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>include any app
+ the operating system</a>), but Apple could change that policy
step</em></ins></span>
+ by <span class="inserted"><ins><em>step. Or perhaps Apple will define
malware to include any app
that China does not like.</p>
- <p>For free software, this means users will need</em></ins></span>
to <span class="removed"><del><strong>break</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> Apple's
- <span class="removed"><del><strong>security</strong></del></span>
- <span class="inserted"><ins><em>approval after compilation. This
amounts</em></ins></span> to <span class="removed"><del><strong>get at
them,</strong></del></span> <span class="inserted"><ins><em>a system of
surveilling
- the use of free programs.</p>
+ <p>For free software, this means users will need to get Apple's
+ approval after compilation. This amounts to a system of
surveilling</em></ins></span>
+ the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span class="inserted"><ins><em>free
programs.</p>
</li>
<li id="M200803070">
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
- iOS, the operating system of the Apple iThings, is the prototype
- of a jail</a>. It was Apple that introduced the practice of
+ iOS, the operating system of the Apple iThings,</em></ins></span> is <span
class="inserted"><ins><em>the prototype
+ of</em></ins></span> a <span class="removed"><del><strong>way
to</strong></del></span> <span class="inserted"><ins><em>jail</a>. It
was Apple that introduced the practice of
designing general purpose computers with censorship of application
programs.</p>
@@ -588,55 +580,77 @@
<li id="M201506250">
<p>Apple has banned iThing
- applications that show the confederate flag. <a
-
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it as a symbol of
racism</a>,</em></ins></span> but <span class="removed"><del><strong>NSA
can access</strong></del></span> <span class="inserted"><ins><em>even
- strategic games that use it to represent confederate army units
+ applications that show the confederate flag.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
+ Not only those that use</em></ins></span> it <span
class="removed"><del><strong>still counts</strong></del></span> as a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span
class="inserted"><ins><em>symbol</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They needed to break
Apple's
+ security to get at them,</strong></del></span> <span
class="inserted"><ins><em>racism</a>,</em></ins></span> but <span
class="removed"><del><strong>NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ MacOS automatically sends</strong></del></span> <span
class="inserted"><ins><em>even
+ strategic games that use it</em></ins></span> to <span
class="inserted"><ins><em>represent confederate army units
fighting in the Civil War.</p>
- <p>This ludicrous rigidity illustrates the point that Apple should
- not be allowed to censor apps. Even if Apple carried out this act of
+ <p>This ludicrous rigidity illustrates the point
that</em></ins></span> Apple <span class="removed"><del><strong>servers unsaved
documents being
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ things you have</strong></del></span> <span
class="inserted"><ins><em>should</em></ins></span>
+ not <span class="removed"><del><strong>decided</strong></del></span> <span
class="inserted"><ins><em>be allowed</em></ins></span> to <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
- about either of these questions, or</em></ins></span> any <span
class="inserted"><ins><em>other.</p>
+ is bad, whether educating people about drone attacks is
bad,</em></ins></span> are <span class="removed"><del><strong>even more
sensitive than</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span>
+ the
+ <span class="removed"><del><strong>things you have stored in
files</a>.</p>
+ </li>
+
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to</strong></del></span> <span
class="inserted"><ins><em>real issue.</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
+ This exposes</strong></del></span> <span class="inserted"><ins><em>should
not have</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> to <span
class="removed"><del><strong>Big Brother</strong></del></span> <span
class="inserted"><ins><em>impose its views
+ about either of these questions, or any other.</p>
</li>
<li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples</em></ins></span> of <span class="removed"><del><strong>them
through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends</strong></del></span> <span
class="inserted"><ins><em>Apple's arbitrary and inconsistent
censorship</a>.</p>
+ More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>perhaps</strong></del></span> <span
class="inserted"><ins><em>inconsistent censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="inserted"><ins><em><a
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>other snoops.</p>
+
+ <p>It</strong></del></span> <span class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for a time. It also <a
+ ban all bitcoin apps</a> for the iThings for a time.
It</em></ins></span> also <span class="removed"><del><strong>demonstrates how
you can't trust proprietary software,
+ because even if today's version doesn't have</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned a game about growing marijuana</a>, while permitting games
+ banned</em></ins></span> a <span class="removed"><del><strong>malicious
+ functionality, tomorrow's version might add it. The developer won't
+ remove</strong></del></span> <span class="inserted"><ins><em>game about
growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed the locations
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>malfeature unless many users push back hard,
and</strong></del></span> <span class="inserted"><ins><em>locations
of US drone assassinations, giving various excuses. Each
- time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection,</em></ins></span>
Apple <span class="removed"><del><strong>servers unsaved documents being
- edited</a>. The</strong></del></span> <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
- things you have not decided to save are even more sensitive
than</strong></del></span>
+ time</em></ins></span> the <span class="removed"><del><strong>users
+ can't remove it themselves.</p>
+ </li>
+
+ <li><p>Various operations in</strong></del></span> <span
class="inserted"><ins><em>developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection,
Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
<span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the
- <span class="removed"><del><strong>things you have stored in
files</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>app
based on the subject matter</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware in
MacOS:</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -644,120 +658,118 @@
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files</strong></del></span>
+ <p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users, or make option settings
hard</em></ins></span>
- to <span class="inserted"><ins><em>find</a>.</p>
+ interfaces designed</em></ins></span> to <span
class="removed"><del><strong>Apple.</p>
+ </li>
- <p>This allows a company such as</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
- This exposes the files</strong></del></span> to <span
class="removed"><del><strong>Big Brother and perhaps</strong></del></span>
<span class="inserted"><ins><em>say, “We allow users</em></ins></span>
- to <span class="removed"><del><strong>other snoops.</p>
+ <li><p>Apple admits the
+ <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying in a search facility</a>, but there's</strong></del></span>
<span class="inserted"><ins><em>mislead users, or make option settings hard
+ to find</a>.</p>
- <p>It also demonstrates</strong></del></span> <span
class="inserted"><ins><em>turn this off” while ensuring that few will
understand</em></ins></span> how <span class="removed"><del><strong>you can't
trust proprietary software,
- because even if today's version doesn't have a malicious
- functionality, tomorrow's version might add it. The developer won't
- remove the malfeature unless many users push back hard, and the users
- can't remove</strong></del></span>
- <span class="inserted"><ins><em>to actually turn</em></ins></span> it
<span class="removed"><del><strong>themselves.</p></strong></del></span>
<span class="inserted"><ins><em>off.</p></em></ins></span>
+ <p>This allows</em></ins></span> a <span
class="removed"><del><strong>lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping that</strong></del></span> <span
class="inserted"><ins><em>company such as</em></ins></span> Apple <span
class="removed"><del><strong>has not talked
about</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to say, “We allow users
+ to turn this off” while ensuring that few will understand how
+ to actually turn it off.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Various operations in
- <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span>
<span class="inserted"><ins><em></ul>
<h3 id="pressuring">Pressuring</h3>
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send</strong></del></span> <span
class="inserted"><ins><em>software. This section</em></ins></span> reports
<span class="inserted"><ins><em>examples of hard sell and other unjust
commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>their customers by imposing arbitrary
limits</em></ins></span> to <span class="removed"><del><strong>exist for no
possible
+ purpose other than surveillance</a>. Here is the <a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+
+ <li><p>The <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where</strong></del></span>
<span class="inserted"><ins><em>their use of</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>software. This section reports examples of hard
sell</em></ins></span> and
+ <span class="removed"><del><strong>get</strong></del></span> other <span
class="removed"><del><strong>info too.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>unjust commercial tactics by Apple.</p>
<ul class="blurbs">
<li id="M201510270">
- <p>Apple Siri <a
-
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
- to <span class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>give
you information</a> about music charts if you're not an Apple
- Music subscriber.</p></em></ins></span>
+ <p>Apple Siri</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
+ to give you information</a> about music charts if
you're</em></ins></span> not <span class="removed"><del><strong>as much
as</strong></del></span> <span class="inserted"><ins><em>an</em></ins></span>
Apple <span
class="removed"><del><strong>claims</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>Music
subscriber.</p></em></ins></span>
</li>
+</ul>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-<span class="inserted"><ins><em></ul>
+<h3 <span class="removed"><del><strong>id="incompatibility">Apple
Incompatibility</h3>
-<h3 id="sabotage">Sabotage</h3>
+<p>In this section, we list characteristics of</strong></del></span>
<span class="inserted"><ins><em>id="sabotage">Sabotage</h3>
-<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>MacOS:
- <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms</strong></del></span>
<span class="inserted"><ins><em>which Apple employs its power over
users</em></ins></span>
-to <span class="removed"><del><strong>Apple.</p>
- </li>
-
- <li><p>Apple admits the
- <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying</strong></del></span> <span class="inserted"><ins><em>directly
intervene</em></ins></span> in <span class="removed"><del><strong>a search
facility</a>, but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="inserted"><ins><em>harm them or block their work.</p>
+<p>These are situations in which</em></ins></span> Apple <span
class="removed"><del><strong>programs that block or
+hinder</strong></del></span> <span class="inserted"><ins><em>employs its power
over</em></ins></span> users <span class="removed"><del><strong>from
switching</strong></del></span>
+to <span class="removed"><del><strong>any alternative
program—and,</strong></del></span> <span
class="inserted"><ins><em>directly intervene</em></ins></span> in
+<span class="removed"><del><strong>particular, from
switching</strong></del></span> <span class="inserted"><ins><em>ways that harm
them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When</em></ins></span> Apple <span
class="removed"><del><strong>has not talked about</a>.</p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>suspects a user</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>fraud, it
+ <p>When Apple suspects a user of fraud, it
judges the case secretly and presents the verdict
- as a fait accompli. The punishment</em></ins></span> to <span
class="removed"><del><strong>exist</strong></del></span> <span
class="inserted"><ins><em>a user found guilty <a
+ as a fait accompli. The punishment</em></ins></span> to <span
class="removed"><del><strong>free software</strong></del></span> <span
class="inserted"><ins><em>a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off</em></ins></span> for <span class="removed"><del><strong>no
possible
- purpose other than surveillance</a>. Here is</strong></del></span>
<span class="inserted"><ins><em>life, which more-or-less
cripples</em></ins></span> the <span class="removed"><del><strong><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user's Apple
- devices forever</a>. There is no appeal.</p></em></ins></span>
- </li>
+ being cut off for life,</em></ins></span> which <span
class="removed"><del><strong>can liberate the device</strong></del></span>
<span class="inserted"><ins><em>more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>software runs on.</p>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810240">
- <p>Apple and Samsung deliberately</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>iThing is, and
- get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>performance of older phones to force users to buy
their newer
- phones</a>.</p></em></ins></span>
+<ul>
+<li>
+<p>Apple</strong></del></span> <span class="inserted"><ins><em>user's
Apple</em></ins></span>
+ devices <span class="removed"><del><strong>lock</strong></del></span>
<span class="inserted"><ins><em>forever</a>. There is no
appeal.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <li id="M201810240">
+ <p>Apple and Samsung deliberately <a
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force</em></ins></span> users <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>to buy their newer
+ phones</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201805310">
+ <li id="M201805310">
<p>Apple has</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data</strong></del></span>
+<span
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+solely</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram</em></ins></span> from <span
class="removed"><del><strong>iPhones</strong></del></span> <span
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span
class="removed"><del><strong>the state</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>a
month</a>.</p></em></ins></span>
+ Telegram from upgrading its app for a month</a>.</p>
+
+ <p>This evidently has to do with Russia's command</em></ins></span>
to Apple <span class="removed"><del><strong>services</a> by being
designed</strong></del></span> to <span class="removed"><del><strong>be
incompatible with all
+other options, ethical or unethical.</p>
+</li>
- <p>This <span class="removed"><del><strong>may have
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to
do</em></ins></span> with
- <span class="removed"><del><strong><a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>;</strong></del></span> <span
class="inserted"><ins><em>Russia's command to Apple to block
+<li>
+<p>iWork (office</strong></del></span> <span
class="inserted"><ins><em>block
Telegram in Russia.</p>
- <p>The Telegram client is free software on other
platforms,</em></ins></span> but
- <span class="removed"><del><strong><a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></strong></del></span>
not <span class="removed"><del><strong>as much as Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on
+ <p>The Telegram client is free</em></ins></span> software <span
class="removed"><del><strong>that runs</strong></del></span> on <span
class="removed"><del><strong>MacOS, iOS and iCloud) uses secret
+formats</strong></del></span> <span class="inserted"><ins><em>other platforms,
but not on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be free
software.</p></em></ins></span>
+ are jails</a>, they don't permit any app to be free
software.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<h3 id="incompatibility">Apple Incompatibility</h3>
-
-<p>In this section, we list characteristics</strong></del></span>
- <span class="inserted"><ins><em><li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes the file system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="inserted"><ins><em>MacOS.</p>
+ <li id="M201710044">
+ <p>MacOS High Sierra forcibly reformats SSD boot
drives,</em></ins></span> and <a <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork">provides
no means
+of converting them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ changes the file system from HFS+</em></ins></span> to <span
class="inserted"><ins><em>APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows</em></ins></span> or <span
class="inserted"><ins><em>even older versions of MacOS.</p>
</li>
<li id="M201706060">
@@ -765,88 +777,42 @@
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple <span
class="removed"><del><strong>programs that block or
-hinder users</strong></del></span> <span class="inserted"><ins><em>stops
people</em></ins></span> from <span
class="removed"><del><strong>switching</strong></del></span> <span
class="inserted"><ins><em>fixing problems themselves;
+ <p>Meanwhile, Apple stops people</em></ins></span> from <span
class="removed"><del><strong>Open Document Formats</a>. iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>fixing problems
themselves;
that's the nature of proprietary software.</p>
</li>
<li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains DRM specifically designed</em></ins></span> to <span
class="removed"><del><strong>any alternative program—and, in
-particular, from switching</strong></del></span> <span
class="inserted"><ins><em><a
+ iPhone 7 contains DRM specifically designed to <a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses the term “lock”</em></ins></span>
- to <span class="removed"><del><strong>free software which can
liberate</strong></del></span> <span
class="inserted"><ins><em>describe</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span
class="removed"><del><strong>software runs on.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>term <a
- href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
- handcuffs</a>.</p>
- </li>
-
- <li id="M201606080"></em></ins></span>
- <p>Apple <span class="removed"><del><strong>devices
lock</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops</em></ins></span> users <span class="inserted"><ins><em>from fixing
the security bugs</em></ins></span> in <span class="removed"><del><strong><a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
-solely</strong></del></span> <span class="inserted"><ins><em>Quicktime for
Windows</a>,
- while refusing</em></ins></span> to <span class="inserted"><ins><em>fix
them itself.</p>
- </li>
-
- <li id="M201605040">
- <p>The</em></ins></span> Apple <span
class="removed"><del><strong>services</a> by being
designed</strong></del></span> <span class="inserted"><ins><em>Music client
program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
- the user's file system for music files, copies them</em></ins></span> to
<span class="removed"><del><strong>be incompatible with all
-other options, ethical or unethical.</p>
-</li>
-
-<li>
-<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats</strong></del></span> <span class="inserted"><ins><em>an Apple
server,</em></ins></span>
- and <span class="inserted"><ins><em>deletes them</a>.</p>
- </li>
-
- <li id="M201602050">
- <p>iOS version 9 for iThings</em></ins></span> <a <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork">provides
no means
-of converting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages</em></ins></span>
- them <span class="removed"><del><strong>to or from Open Document
Formats</a>. iWork formats
-have changed several times since</strong></del></span> <span
class="inserted"><ins><em>irreparably if</em></ins></span> they were <span
class="removed"><del><strong>first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>repaired by someone
other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism from</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
- was wrong.</p>
- </li>
-
- <li id="M201510020">
- <p>Apple forced millions</em></ins></span> of <span
class="removed"><del><strong>thwarting <a
+ <p>The article uses the term “lock”
+ to describe</em></ins></span> the <span
class="removed"><del><strong>effect of thwarting <a
href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
efforts</a>, thus preventing free software from fully supporting
them.</p>
-<p>iWork formats are considered</strong></del></span> <span
class="inserted"><ins><em>iThings to</em></ins></span> <a
+<p>iWork formats are considered</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer to use the term</em></ins></span>
<a
<span
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p>
-</li>
-
-<li>
-<p>In MacOS and iOS,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://discussions.apple.com/thread/7256669?tstart=0">download
- a system upgrade without asking</em></ins></span> the <span
class="removed"><del><strong>procedure for</strong></del></span> <span
class="inserted"><ins><em>users</a>. Apple did not
- forcibly install the upgrade but the downloading alone caused lots
- of trouble.</p>
+unfit for document preservation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks">
digital
+ handcuffs</a>.</p></em></ins></span>
</li>
- <li id="M201412040">
+<span class="removed"><del><strong><li>
+<p>In MacOS and iOS, the procedure for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080">
<p>Apple</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
converting images</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted</em></ins></span> from <span
class="inserted"><ins><em>iPods</em></ins></span> the <span
class="removed"><del><strong>Photos format</a> to a free format is so
tedious
-and time-consuming</strong></del></span> <span
class="inserted"><ins><em>music</em></ins></span> that users <span
class="removed"><del><strong>just give up if they have a lot of
them.</p></strong></del></span> <span class="inserted"><ins><em>had got
from internet music
- stores that competed with iTunes</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+ stops users</em></ins></span> from <span
class="inserted"><ins><em>fixing</em></ins></span> the <span
class="removed"><del><strong>Photos format</a></strong></del></span>
<span class="inserted"><ins><em>security bugs in Quicktime for
Windows</a>,
+ while refusing</em></ins></span> to <span class="removed"><del><strong>a
free format is so tedious
+and time-consuming that users just give up if they have a lot of
them.</p></strong></del></span> <span class="inserted"><ins><em>fix them
itself.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -854,77 +820,117 @@
<ul>
<li><p>iTunes videos have DRM, which allows</strong></del></span>
- <span class="inserted"><ins><em><li id="M200709270">
- <p><a
-
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
- An</em></ins></span> Apple <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
- unlocked</a>. The “upgrade” also deactivated
applications
- not approved by</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201605040">
+ <p>The</em></ins></span> Apple <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>Music client program</em></ins></span> <a
<span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its customers can
- watch the videos they purchased</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently
intentional.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The DMCA
and</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-
-<h3 id="surveillance">Surveillance</h3>
-
-<ul class="blurbs">
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="removed"><del><strong>EU Copyright Directive
make</strong></del></span> <span class="inserted"><ins><em>Great Nation”
app requires users to grant</em></ins></span> it <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to <span class="removed"><del><strong>study how
iOS cr...apps spy on users</a>, because this
- would require circumventing</strong></del></span> the <span
class="removed"><del><strong>iOS DRM.</p>
+ watch the videos they purchased</a>.</p>
</li>
- <li><p><a
-
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging an iThing with a
+ <li><p>The DMCA and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ the <span class="removed"><del><strong>EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span class="inserted"><ins><em>user's
file system for music files, copies them</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would require circumventing the iOS DRM.</p></strong></del></span>
<span class="inserted"><ins><em>an Apple server,
+ and deletes them</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
+
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201602050">
+ <p>iOS version 9 for iThings <a
+
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ them irreparably if they were repaired by someone other than
+ Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>uses DRM software to prevent
people</strong></del></span> <span class="inserted"><ins><em>eventually backed
off from this policy under
+ criticism</em></ins></span> from <span
class="removed"><del><strong>charging an iThing with a
generic USB cable</a>.</p></li>
<li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
- internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>fact that a new model of Macbook
introduced</strong></del></span> <span class="inserted"><ins><em>Android
version was found to contain</em></ins></span> a <span
class="removed"><del><strong>requirement
- for monitors</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing
developers</em></ins></span> to <span class="removed"><del><strong>have
malicious hardware, but DRM software in MacOS is
- involved</strong></del></span> <span class="inserted"><ins><em>run any code
they wish</em></ins></span> in <span
class="removed"><del><strong>activating</strong></del></span> the <span
class="removed"><del><strong>hardware. The software for accessing iTunes
- is also responsible.</p>
+ focuses on</strong></del></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>users. However, it has not
acknowledged</em></ins></span> that <span class="removed"><del><strong>a new
model</strong></del></span> <span class="inserted"><ins><em>this
+ was wrong.</p>
+ </li>
+
+ <li id="M201510020">
+ <p>Apple forced millions</em></ins></span> of <span
class="removed"><del><strong>Macbook introduced a requirement
+ for monitors</strong></del></span> <span
class="inserted"><ins><em>iThings</em></ins></span> to <span
class="removed"><del><strong>have malicious hardware,</strong></del></span>
<span class="inserted"><ins><em><a
+ href="https://discussions.apple.com/thread/7256669?tstart=0">download
+ a system upgrade without asking the users</a>. Apple did not
+ forcibly install the upgrade</em></ins></span> but <span
class="removed"><del><strong>DRM software in MacOS is
+ involved in activating</strong></del></span> the <span
class="removed"><del><strong>hardware.</strong></del></span> <span
class="inserted"><ins><em>downloading alone caused lots
+ of trouble.</p>
</li>
- <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on
Windows</strong></del></span> <span class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading</em></ins></span> and
<span class="removed"><del><strong>said that MacOS would do the same thing
subsequently.)</p></li>
+ <li id="M201412040">
+ <p>Apple <a
+
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
+ stores that competed with iTunes</a>.</p>
+ </li>
+
+ <li id="M200709270">
+ <p><a
+
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An Apple firmware “upgrade” bricked iPhones that had been
+ unlocked</a>.</em></ins></span> The <span
class="removed"><del><strong>software for accessing iTunes
+ is</strong></del></span> <span
class="inserted"><ins><em>“upgrade”</em></ins></span> also <span
class="removed"><del><strong>responsible.</p></strong></del></span> <span
class="inserted"><ins><em>deactivated applications
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently
intentional.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do the same thing
subsequently.)</p></li></strong></del></span>
</ul>
-<h3 id="jails">Apple Jails</h3>
+
+<h3 <span class="removed"><del><strong>id="jails">Apple Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS, the operating system of the Apple iThings,</strong></del></span> <span
class="inserted"><ins><em>using this
- app</em></ins></span> is <span class="removed"><del><strong>the
prototype</strong></del></span> <span class="inserted"><ins><em>mandatory at
some workplaces.</p>
+iOS, the operating system of the</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version</em></ins></span> of <span
class="inserted"><ins><em>the article</a> (partly obfuscated, but
- readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>jail</a>. It was
Apple</strong></del></span> <span class="inserted"><ins><em>text editor)
includes a clarification
- saying</em></ins></span> that <span
class="removed"><del><strong>introduced the practice of
-designing general purpose computers with censorship of application
+<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from</em></ins></span> Apple <span
class="removed"><del><strong>iThings, is</strong></del></span> <span
class="inserted"><ins><em>devices in China to</em></ins></span> the <span
class="removed"><del><strong>prototype
+of a jail</a>. It was Apple</strong></del></span> <span
class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>, to check URLs</em></ins></span> that <span
class="removed"><del><strong>introduced the practice of
+designing general purpose computers</strong></del></span> <span
class="inserted"><ins><em>possibly correspond to
+ “fraudulent” websites. Since Tencent
collaborates</em></ins></span>
+ with <span class="removed"><del><strong>censorship</strong></del></span>
<span class="inserted"><ins><em>the Chinese government, its Safe Browsing black
list most certainly
+ contains the websites</em></ins></span> of <span
class="removed"><del><strong>application
programs.</p>
-<p>Here is an article about</strong></del></span> the <span
class="removed"><del><strong><a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on</em></ins></span> the
<span class="removed"><del><strong>iThings use to lock up</strong></del></span>
<span class="inserted"><ins><em>Android version
- of</em></ins></span> the <span class="removed"><del><strong>user.</p>
-
-<p>Curiously, Apple is beginning</strong></del></span> <span
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span
class="removed"><del><strong>allow limited passage through the
-walls</strong></del></span> <span class="inserted"><ins><em>Apple, “this
kind</em></ins></span> of <span class="removed"><del><strong>the iThing jail:
users can now install</strong></del></span>
- <span class="inserted"><ins><em>‘superuser’ surveillance could
not be conducted on
+<p>Here is an article about</strong></del></span> <span
class="inserted"><ins><em>political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="inserted"><ins><em>Great Nation” app requires users
to grant it</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a> that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to</em></ins></span> the <span class="removed"><del><strong>iThings
use</strong></del></span> <span class="inserted"><ins><em>phone's microphone,
photos, text messages, contacts, and
+ internet history</a>, and the Android version was
found</em></ins></span> to <span class="removed"><del><strong>lock
up</strong></del></span> <span class="inserted"><ins><em>contain a
+ back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="removed"><del><strong>user.</p>
+
+<p>Curiously, Apple</strong></del></span> <span
class="inserted"><ins><em>users'
+ phone, as “superusers.” Downloading and using this
+ app</em></ins></span> is <span class="removed"><del><strong>beginning to
allow limited passage through</strong></del></span> <span
class="inserted"><ins><em>mandatory at some workplaces.</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the
+<span class="removed"><del><strong>walls</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android
version</em></ins></span>
+ of the <span class="removed"><del><strong>iThing jail: users can now
install</strong></del></span> <span class="inserted"><ins><em>app, and that,
according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
@@ -1303,7 +1309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-apple.de.po 21 Oct 2019 07:00:13 -0000 1.148
+++ malware-apple.de.po 31 Oct 2019 12:01:57 -0000 1.149
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1246,6 +1246,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- malware-apple.es.po 22 Oct 2019 10:50:07 -0000 1.174
+++ malware-apple.es.po 31 Oct 2019 12:01:57 -0000 1.175
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -1095,6 +1096,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- malware-apple.fr.po 25 Oct 2019 17:59:14 -0000 1.182
+++ malware-apple.fr.po 31 Oct 2019 12:01:57 -0000 1.183
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-10-21 11:28+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -1098,6 +1099,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-apple.it-diff.html 21 Oct 2019 07:00:13 -0000 1.61
+++ malware-apple.it-diff.html 31 Oct 2019 12:01:57 -0000 1.62
@@ -429,7 +429,7 @@
by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system
itself.</em></ins></span>
- While subjecting its users to its own surveillance, it tries to
+ While subjecting its users to <span class="removed"><del><strong>its own
surveillance,</strong></del></span> <span class="inserted"><ins><em>its own
surveillance, it tries to
protect its users from Russian surveillance, and is therefore subject
to Russian censorship.</p>
@@ -437,36 +437,24 @@
apps.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Apple</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701050">
- <p>Apple</em></ins></span> used its censorship system to enforce
China's censorship <a <span
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by</em></ins></span> blocking distribution of the New York Times <span
class="removed"><del><strong>app</a>.</p></li>
-
-<li><p>
-Apple</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+ <li id="M201701050">
+ <p>Apple used its censorship system to enforce China's censorship
<a
+
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
+ by blocking distribution of the New York Times app</a>.</p>
</li>
<li id="M201605190">
- <p>Apple</em></ins></span> censors games, <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning</em></ins></span> some games from the cr…app
store</a> because of which
+ <p>Apple censors games, <a
+
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning some games from the cr…app store</a> because of which
political points they suggest. Some political points are apparently
considered acceptable.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Apple</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509290">
- <p>Apple</em></ins></span> <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ <li id="M201509290">
+ <p>Apple <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
- committed the enormity of disassembling some <span
class="removed"><del><strong>iThings.
-</p></li>
-
-<li><p></strong></del></span> <span
class="inserted"><ins><em>iThings.</p>
+ committed the enormity of disassembling some iThings.</p>
</li>
<li id="M201509230">
@@ -490,39 +478,38 @@
<p>This ludicrous rigidity illustrates the point that Apple should
not be allowed to censor apps. Even if Apple carried out this act of
- censorship with some care, it would still be wrong. Whether racism
+ censorship with some care,</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
+ the real issue. Apple should not have the power</em></ins></span> to
<span class="removed"><del><strong>protect</strong></del></span> <span
class="inserted"><ins><em>impose</em></ins></span> its <span
class="removed"><del><strong>users from Russian
surveillance,</strong></del></span> <span class="inserted"><ins><em>views
about either of these questions, or any other.</p>
</li>
<li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
+ More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>is therefore
+subject</strong></del></span> <span class="inserted"><ins><em>inconsistent
censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014 to <a
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>Russian censorship.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for a time. It also <a
+ ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>point here is</strong></del></span> <span
class="inserted"><ins><em>iThings for a time. It also <a
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
- about other crimes such as killing people. Perhaps</em></ins></span>
Apple <span class="inserted"><ins><em>considers
+ about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
</li>
<li id="M201402070">
- <p>Apple</em></ins></span> rejected an app that displayed the
locations
- of US drone assassinations, giving various excuses. Each
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span>
+ of <span class="removed"><del><strong>Apple's
censorship</strong></del></span> <span class="inserted"><ins><em>US drone
assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection, Apple <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted</em></ins></span> it was censoring the app based on the subject
<span class="removed"><del><strong>matter</a>.
-</p></li>
-
-<li><p>
-As of 2015, Apple</strong></del></span> <span
class="inserted"><ins><em>matter</a>.</p>
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
@@ -531,12 +518,9 @@
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
-rights</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users,</em></ins></span> or <span
class="removed"><del><strong>would help women find
abortions</a>.</p>
-
-<p></strong></del></span> <span class="inserted"><ins><em>make option
settings hard
+ <p>“Dark patterns” are <a
+
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed to mislead users, or make option settings hard
to find</a>.</p>
<p>This allows a company such as Apple to say, “We allow users
@@ -548,71 +532,108 @@
<h3 id="pressuring">Pressuring</h3>
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software.</em></ins></span> This
<span class="removed"><del><strong>particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
-affects</strong></del></span> <span class="inserted"><ins><em>section reports
examples of hard sell and</em></ins></span> other <span
class="inserted"><ins><em>unjust commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage</em></ins></span> of
+<span class="removed"><del><strong>apps.</p></strong></del></span> <span
class="inserted"><ins><em>their customers by imposing arbitrary limits to their
use of the software. This section reports examples of hard sell and other
unjust commercial tactics by Apple.</p>
<ul class="blurbs">
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
- to give you information</a> about music charts if you're not
an</em></ins></span> Apple <span
class="removed"><del><strong>services</a>.
-</p></li></strong></del></span>
- <span class="inserted"><ins><em>Music subscriber.</p>
- </li></em></ins></span>
-</ul>
+ to give you information</a> about music charts if you're not an Apple
+ Music subscriber.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li><p></strong></del></span>
+<span class="inserted"><ins><em></ul>
-<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3></strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Sabotage</h3></em></ins></span>
+<h3 id="sabotage">Sabotage</h3>
-<p>These <span class="removed"><del><strong>bugs are/were not
intentional, so unlike the rest</strong></del></span> <span
class="inserted"><ins><em>are situations in which Apple employs its power over
users
+<p>These are situations in which Apple employs its power over users
to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects a user</em></ins></span> of <span
class="inserted"><ins><em>fraud, it
- judges</em></ins></span> the <span class="removed"><del><strong>file
- they</strong></del></span> <span class="inserted"><ins><em>case secretly and
presents the verdict
- as a fait accompli. The punishment to a user found guilty <a
-
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off for life, which more-or-less cripples the user's Apple
- devices forever</a>. There is no appeal.</p>
+ <p>When</em></ins></span> Apple <span
class="removed"><del><strong>used its censorship system</strong></del></span>
<span class="inserted"><ins><em>suspects a user of fraud, it
+ judges the case secretly and presents the verdict
+ as a fait accompli. The punishment</em></ins></span> to <span
class="removed"><del><strong>enforce
+China's censorship</strong></del></span> <span class="inserted"><ins><em>a
user found guilty</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">by
+blocking distribution of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
+ being cut off for life, which more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>New York Times
app</a>.</p></li>
+
+<li><p></strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> Apple <span
class="removed"><del><strong>censors
+games,</strong></del></span>
+ <span class="inserted"><ins><em>devices forever</a>. There is no
appeal.</p>
</li>
<li id="M201810240">
- <p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance of older phones to force users to buy their newer
- phones</a>.</p>
+ <p>Apple and Samsung deliberately</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
+ the <span class="removed"><del><strong>cr…app store</a>
because</strong></del></span> <span
class="inserted"><ins><em>performance</em></ins></span> of <span
class="removed"><del><strong>which political
+points they suggest. Some political points are apparently considered
+acceptable.</p></strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
+ phones</a>.</p></em></ins></span>
</li>
- <li id="M201805310">
- <p>Apple has <a
-
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
+<span class="removed"><del><strong><li><p>
+Apple</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201805310">
+ <p>Apple has</em></ins></span> <a <span
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+banned a program</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
+ Telegram</em></ins></span> from <span class="removed"><del><strong>the App
Store</a> because</strong></del></span> <span
class="inserted"><ins><em>upgrading</em></ins></span> its <span
class="removed"><del><strong>developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an</strong></del></span> app <span
class="removed"><del><strong>that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one “problem”, Apple complained about another.
+After the fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>for a month</a>.</p>
- <p>This evidently has to</em></ins></span> do <span
class="inserted"><ins><em>with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span class="inserted"><ins><em>to block
Telegram in Russia.</p>
- <p>The Telegram client is free software on other platforms,
but</em></ins></span> not <span class="removed"><del><strong>count as malware.
We mention them</strong></del></span> <span class="inserted"><ins><em>on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app</em></ins></span> to <span
class="removed"><del><strong>refute</strong></del></span> <span
class="inserted"><ins><em>be free software.</p>
+ <p>The Telegram client is free software on other platforms, but not
on
+ iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
+ are jails</a>, they don't permit any</em></ins></span> app <span
class="removed"><del><strong>based on the subject matter</a>.
+</p></li>
+
+<li><p>
+As of 2015, Apple</strong></del></span> <span class="inserted"><ins><em>to be
free software.</p>
</li>
<li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
changes the file system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ accessed from GNU/Linux, Windows</em></ins></span> or <span
class="removed"><del><strong>would help women find
abortions</a>.</p>
+
+<p>
+This particular political slant</strong></del></span> <span
class="inserted"><ins><em>even older versions of MacOS.</p>
</li>
<li id="M201706060">
- <p>Apple will stop <a
-
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs for older model iThings</a>.</p>
+ <p>Apple will stop</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects other Apple services</a>.
+</p></li>
+</ul>
+
+<h3 id="insecurity">Apple Insecurity</h3>
+
+<p>These</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing</em></ins></span>
+ bugs <span class="removed"><del><strong>are/were not intentional, so
unlike</strong></del></span> <span class="inserted"><ins><em>for older model
iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's</em></ins></span> the
- <span class="removed"><del><strong>supposition that
prestigious</strong></del></span> <span class="inserted"><ins><em>nature
of</em></ins></span> proprietary <span class="removed"><del><strong>software
doesn't have grave
+ that's</em></ins></span> the <span
class="removed"><del><strong>rest</strong></del></span> <span
class="inserted"><ins><em>nature</em></ins></span> of <span
class="removed"><del><strong>the file
+ they do not count as malware. We mention them to refute the
+ supposition that prestigious</strong></del></span> proprietary <span
class="removed"><del><strong>software doesn't have grave
bugs.</p>
<ul>
@@ -678,47 +699,66 @@
href="https://discussions.apple.com/thread/7256669?tstart=0">download</em></ins></span>
a system upgrade
<span class="removed"><del><strong><a
href="https://discussions.apple.com/thread/7256669?tstart0=">without</strong></del></span>
<span class="inserted"><ins><em>without</em></ins></span> asking the
users</a>. Apple did not
- forcibly install the upgrade but the <span
class="removed"><del><strong>downloading alone caused lots of trouble.</p>
- </li>
-</ul>
-
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
-
-<ul>
- <li><p>Apple Siri</strong></del></span> <span
class="inserted"><ins><em>downloading alone caused lots
+ forcibly install the upgrade but the <span
class="removed"><del><strong>downloading alone caused
lots</strong></del></span> <span class="inserted"><ins><em>downloading alone
caused lots
of trouble.</p>
</li>
<li id="M201412040">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
- about</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the</em></ins></span> music <span
class="removed"><del><strong>charts if you're not an</strong></del></span>
<span class="inserted"><ins><em>that users had got from internet music
+ <p>Apple <a
+
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
stores that competed with iTunes</a>.</p>
</li>
<li id="M200709270">
<p><a
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
- An</em></ins></span> Apple <span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
+ An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently
intentional.</p></em></ins></span>
+ censorship</a>. All this was apparently intentional.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3></strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
- <li id="M201910130"></em></ins></span>
- <p>The <span
class="removed"><del><strong>wrongs</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites</em></ins></span> of <span
class="removed"><del><strong>trouble.</p>
+ </li>
+</ul>
+
+<h3 id="pressuring">Apple Pressuring</h3>
+
+<p>Proprietary companies</strong></del></span> <span
class="inserted"><ins><em>political opponents. By linking the requests
+ originating from single IP addresses, the government</em></ins></span> can
<span class="removed"><del><strong>take advantage of</strong></del></span>
<span class="inserted"><ins><em>identify
+ dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>customers by imposing arbitrary
limits</strong></del></span> <span class="inserted"><ins><em>lives.</p>
+ </li>
+
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
+ access</em></ins></span> to <span class="removed"><del><strong>their use
of</strong></del></span> the <span class="removed"><del><strong>software. This
section reports examples of hard sell</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages,
contacts,</em></ins></span> and <span class="removed"><del><strong>other unjust
commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri
+ <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</strong></del></span>
+ <span class="inserted"><ins><em>internet history</a>, and the
Android version was found</em></ins></span> to <span
class="removed"><del><strong>give you information</a>
+ about music charts if you're not an Apple Music subscriber.</p>
+ </li>
+</ul>
+
+<h3 id="sabotage">Apple Sabotage</h3>
+
+<p>The wrongs</strong></del></span> <span
class="inserted"><ins><em>contain a
back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
phone, as “superusers.” Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
not involve making</strong></del></span>
@@ -1177,7 +1217,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.it.po 21 Oct 2019 07:00:13 -0000 1.142
+++ malware-apple.it.po 31 Oct 2019 12:01:57 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1270,6 +1270,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- malware-apple.ja-diff.html 21 Oct 2019 07:00:13 -0000 1.74
+++ malware-apple.ja-diff.html 31 Oct 2019 12:01:57 -0000 1.75
@@ -191,67 +191,92 @@
</p></li>
<li><p>
-As</strong></del></span> <span class="inserted"><ins><em>system proprietary
- software <a href="#M201908150">turns off certain features when
batteries
- are replaced other than by Apple.</a></p>
+As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights or would help women find abortions</a>.</p>
+
+<p>
+This particular political slant</strong></del></span> <span
class="inserted"><ins><em>system proprietary
+ software</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects</strong></del></span> <span
class="inserted"><ins><em>href="#M201908150">turns off certain features when
batteries
+ are replaced</em></ins></span> other <span
class="removed"><del><strong>Apple services</a>.
+</p></li>
+</ul>
+
+<h3 id="insecurity">Apple Insecurity</h3>
+
+<ul>
+ <li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to</strong></del></span> <span class="inserted"><ins><em>than by
Apple.</a></p>
</li>
<li id="M201704070.1">
- <p>DRM makes the iPhone 7 nearly <a
- href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging an iThing
- with a generic USB cable</a>.</p>
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware, but DRM software
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that a new model of Macbook
introduced</em></ins></span> a
+ <span class="inserted"><ins><em>requirement for monitors to
have</em></ins></span> malicious <span class="removed"><del><strong>web
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM
software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>same
thing subsequently.)</p>
</li>
<li id="M200703310">
<p>iTunes videos have DRM, which allows Apple to <a
href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
- customers can watch the videos they purchased</a>.</p>
+ customers can watch the videos they
purchased</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="incompatibility">Incompatibility</h3>
+<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
+<p>Various proprietary</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Incompatibility</h3>
-<p>In this section, we list characteristics of Apple programs that block
or
-hinder users from switching to any alternative program—and, in
+<p>In this section, we list characteristics of Apple</em></ins></span>
programs <span class="removed"><del><strong>often mess up the user's system.
They are like sabotage, but they are not grave enough</strong></del></span>
<span class="inserted"><ins><em>that block or
+hinder users from switching</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>any alternative program—and, in
particular, from switching to free software which can liberate the device
the software runs on.</p>
<ul class="blurbs">
<li id="M201803300">
- <p>In MacOS and iOS, the procedure for <a
+ <p>In MacOS and iOS, the procedure</em></ins></span> for <span
class="inserted"><ins><em><a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from the Photos format</a> to a free format is so
- tedious and time-consuming that users just give up if they have a
- lot of them.</p>
+ converting images from</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty</strong></del></span> <span class="inserted"><ins><em>Photos
format</a> to a free format is so
+ tedious</em></ins></span> and <span class="removed"><del><strong>wrong.
This section describes examples</strong></del></span> <span
class="inserted"><ins><em>time-consuming that users just give up if they have a
+ lot</em></ins></span> of <span class="inserted"><ins><em>them.</p>
</li>
<li id="M201802120">
<p>Apple devices lock users in <a
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by being designed to be incompatible
+ solely to</em></ins></span> Apple <span
class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>services</a> by being designed to be
incompatible
with all other options, ethical or unethical.</p>
</li>
@@ -472,18 +497,14 @@
</li>
<li id="M201509230">
- <p>As</em></ins></span> of 2015, Apple <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically</em></ins></span> bans apps that endorse abortion rights or
would help
+ <p>As of 2015, Apple <a
+
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
-<span class="removed"><del><strong><p>
-This</strong></del></span>
-
- <span class="inserted"><ins><em><p>This</em></ins></span> particular
political slant <a
+ <p>This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple <span class="removed"><del><strong>services</a>.
-</p></li></strong></del></span> <span
class="inserted"><ins><em>services</a>.</p>
+ affects other Apple services</a>.</p>
</li>
<li id="M201506250">
@@ -555,48 +576,38 @@
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a> about music charts if you're not an Apple
Music subscriber.</p>
- </li></em></ins></span>
+ </li>
</ul>
-<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3>
+<h3 id="sabotage">Sabotage</h3>
-<ul>
- <li>
- <p>A vulnerability</strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Sabotage</h3>
-
-<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
- to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application</strong></del></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
-to <span class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>directly intervene in ways that harm them or block
their work.</p>
+<p>These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>fraud, it
+ <p>When Apple suspects a user of fraud, it
judges the case secretly and presents the verdict
as a fait accompli. The punishment to a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
being cut off for life, which more-or-less cripples the user's Apple
- devices forever</a>. There is no appeal.</p></em></ins></span>
+ devices forever</a>. There is no appeal.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810240">
+ <li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>iThings Messages
- app</strong></del></span> <span class="inserted"><ins><em>performance of
older phones to force users to buy their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
- <p>Apple has</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>malicious web site</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
+ <p>Apple has <a
+
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
+ Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>do with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command to Apple to block
Telegram in Russia.</p>
<p>The Telegram client is free software on other platforms, but not
on
@@ -607,22 +618,17 @@
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span class="removed"><del><strong>user's
messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
+ changes the file system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="interference">Apple Interference</h3>
-<p>Various</strong></del></span>
- <span class="inserted"><ins><em><li id="M201706060">
+ <li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of</em></ins></span> proprietary <span
class="removed"><del><strong>programs often mess up</strong></del></span> <span
class="inserted"><ins><em>software.</p>
+ that's the nature of proprietary software.</p>
</li>
<li id="M201704070">
@@ -632,8 +638,8 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like
sabotage,</strong></del></span> <span class="inserted"><ins><em>term
“lock”
- to describe the DRM,</em></ins></span> but <span
class="removed"><del><strong>they are not grave enough</strong></del></span>
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>use the term <a
+ <p>The article uses the term “lock”
+ to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
@@ -641,26 +647,22 @@
<li id="M201606080">
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops users from fixing the security bugs in Quicktime</em></ins></span>
for <span class="inserted"><ins><em>Windows</a>,
+ stops users from fixing the security bugs in Quicktime for
Windows</a>,
while refusing to fix them itself.</p>
</li>
<li id="M201605040">
<p>The Apple Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
- the <span class="removed"><del><strong>word “sabotage”.
Nonetheless, they are nasty</strong></del></span> <span
class="inserted"><ins><em>user's file system for music files, copies them to an
Apple server,</em></ins></span>
- and <span class="removed"><del><strong>wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>deletes
them</a>.</p>
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
+ the user's file system for music files, copies them to an Apple server,
+ and deletes them</a>.</p>
</li>
<li id="M201602050">
<p>iOS version 9 for iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>eventually backed off from this policy under
+ Apple</a>. Apple eventually backed off from this policy under
criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
@@ -673,38 +675,51 @@
forcibly install the upgrade but the downloading alone caused lots
of trouble.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
-
-<ul>
- <li><p>Apple Siri</strong></del></span>
<span class="inserted"><ins><em><li id="M201412040">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
- about</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the</em></ins></span> music <span
class="removed"><del><strong>charts if you're not an</strong></del></span>
<span class="inserted"><ins><em>that users had got from internet music
+ <p>Apple <a
+
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
stores that competed with iTunes</a>.</p>
</li>
<li id="M200709270">
<p><a
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
- An</em></ins></span> Apple <span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
+ An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently
intentional.</p></em></ins></span>
- </li>
+ censorship</a>. All this was apparently intentional.</p>
+ </li></em></ins></span>
</ul>
-<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3></strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
<ul class="blurbs">
- <li id="M201910130"></em></ins></span>
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>their use of</strong></del></span> the <span
class="removed"><del><strong>software. This section reports
examples</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites</em></ins></span> of <span
class="removed"><del><strong>hard sell</strong></del></span> <span
class="inserted"><ins><em>political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>other unjust commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri
+ <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
+ about music charts if you're not an Apple Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>Hong Kong, thus endangering their
lives.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="sabotage">Apple Sabotage</h3></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130"></em></ins></span>
<p>The <span
class="removed"><del><strong>wrongs</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
@@ -1141,7 +1156,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- malware-apple.ja.po 21 Oct 2019 07:00:13 -0000 1.125
+++ malware-apple.ja.po 31 Oct 2019 12:01:57 -0000 1.126
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -954,6 +954,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-apple.nl-diff.html 21 Oct 2019 07:00:13 -0000 1.79
+++ malware-apple.nl-diff.html 31 Oct 2019 12:01:57 -0000 1.80
@@ -191,67 +191,92 @@
</p></li>
<li><p>
-As</strong></del></span> <span class="inserted"><ins><em>system proprietary
- software <a href="#M201908150">turns off certain features when
batteries
- are replaced other than by Apple.</a></p>
+As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
+rights or would help women find abortions</a>.</p>
+
+<p>
+This particular political slant</strong></del></span> <span
class="inserted"><ins><em>system proprietary
+ software</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+affects</strong></del></span> <span
class="inserted"><ins><em>href="#M201908150">turns off certain features when
batteries
+ are replaced</em></ins></span> other <span
class="removed"><del><strong>Apple services</a>.
+</p></li>
+</ul>
+
+<h3 id="insecurity">Apple Insecurity</h3>
+
+<ul>
+ <li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to</strong></del></span> <span class="inserted"><ins><em>than by
Apple.</a></p>
</li>
<li id="M201704070.1">
- <p>DRM makes the iPhone 7 nearly <a
- href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging an iThing
- with a generic USB cable</a>.</p>
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware, but DRM software
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that a new model of Macbook
introduced</em></ins></span> a
+ <span class="inserted"><ins><em>requirement for monitors to
have</em></ins></span> malicious <span class="removed"><del><strong>web
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM
software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>same
thing subsequently.)</p>
</li>
<li id="M200703310">
<p>iTunes videos have DRM, which allows Apple to <a
href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
- customers can watch the videos they purchased</a>.</p>
+ customers can watch the videos they
purchased</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="incompatibility">Incompatibility</h3>
+<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
+<p>Various proprietary</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Incompatibility</h3>
-<p>In this section, we list characteristics of Apple programs that block
or
-hinder users from switching to any alternative program—and, in
+<p>In this section, we list characteristics of Apple</em></ins></span>
programs <span class="removed"><del><strong>often mess up the user's system.
They are like sabotage, but they are not grave enough</strong></del></span>
<span class="inserted"><ins><em>that block or
+hinder users from switching</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>any alternative program—and, in
particular, from switching to free software which can liberate the device
the software runs on.</p>
<ul class="blurbs">
<li id="M201803300">
- <p>In MacOS and iOS, the procedure for <a
+ <p>In MacOS and iOS, the procedure</em></ins></span> for <span
class="inserted"><ins><em><a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from the Photos format</a> to a free format is so
- tedious and time-consuming that users just give up if they have a
- lot of them.</p>
+ converting images from</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty</strong></del></span> <span class="inserted"><ins><em>Photos
format</a> to a free format is so
+ tedious</em></ins></span> and <span class="removed"><del><strong>wrong.
This section describes examples</strong></del></span> <span
class="inserted"><ins><em>time-consuming that users just give up if they have a
+ lot</em></ins></span> of <span class="inserted"><ins><em>them.</p>
</li>
<li id="M201802120">
<p>Apple devices lock users in <a
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by being designed to be incompatible
+ solely to</em></ins></span> Apple <span
class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>services</a> by being designed to be
incompatible
with all other options, ethical or unethical.</p>
</li>
@@ -472,18 +497,14 @@
</li>
<li id="M201509230">
- <p>As</em></ins></span> of 2015, Apple <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically</em></ins></span> bans apps that endorse abortion rights or
would help
+ <p>As of 2015, Apple <a
+
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
-<span class="removed"><del><strong><p>
-This</strong></del></span>
-
- <span class="inserted"><ins><em><p>This</em></ins></span> particular
political slant <a
+ <p>This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple <span class="removed"><del><strong>services</a>.
-</p></li></strong></del></span> <span
class="inserted"><ins><em>services</a>.</p>
+ affects other Apple services</a>.</p>
</li>
<li id="M201506250">
@@ -555,48 +576,38 @@
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a> about music charts if you're not an Apple
Music subscriber.</p>
- </li></em></ins></span>
+ </li>
</ul>
-<h3 <span class="removed"><del><strong>id="insecurity">Apple
Insecurity</h3>
+<h3 id="sabotage">Sabotage</h3>
-<ul>
- <li>
- <p>A vulnerability</strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Sabotage</h3>
-
-<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API allowed an attacker
- to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application</strong></del></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>Apple employs its power over users</em></ins></span>
-to <span class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>directly intervene in ways that harm them or block
their work.</p>
+<p>These are situations in which Apple employs its power over users
+to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>fraud, it
+ <p>When Apple suspects a user of fraud, it
judges the case secretly and presents the verdict
as a fait accompli. The punishment to a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
being cut off for life, which more-or-less cripples the user's Apple
- devices forever</a>. There is no appeal.</p></em></ins></span>
+ devices forever</a>. There is no appeal.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810240">
+ <li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>iThings Messages
- app</strong></del></span> <span class="inserted"><ins><em>performance of
older phones to force users to buy their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
- <p>Apple has</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>malicious web site</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
+ <p>Apple has <a
+
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
+ Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>do with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command to Apple to block
Telegram in Russia.</p>
<p>The Telegram client is free software on other platforms, but not
on
@@ -607,22 +618,17 @@
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span class="removed"><del><strong>user's
messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
+ changes the file system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="interference">Apple Interference</h3>
-<p>Various</strong></del></span>
- <span class="inserted"><ins><em><li id="M201706060">
+ <li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of</em></ins></span> proprietary <span
class="removed"><del><strong>programs often mess up</strong></del></span> <span
class="inserted"><ins><em>software.</p>
+ that's the nature of proprietary software.</p>
</li>
<li id="M201704070">
@@ -632,8 +638,8 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like
sabotage,</strong></del></span> <span class="inserted"><ins><em>term
“lock”
- to describe the DRM,</em></ins></span> but <span
class="removed"><del><strong>they are not grave enough</strong></del></span>
<span class="inserted"><ins><em>we prefer</em></ins></span> to <span
class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>use the term <a
+ <p>The article uses the term “lock”
+ to describe the DRM, but we prefer to use the term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
@@ -641,26 +647,22 @@
<li id="M201606080">
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops users from fixing the security bugs in Quicktime</em></ins></span>
for <span class="inserted"><ins><em>Windows</a>,
+ stops users from fixing the security bugs in Quicktime for
Windows</a>,
while refusing to fix them itself.</p>
</li>
<li id="M201605040">
<p>The Apple Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
- the <span class="removed"><del><strong>word “sabotage”.
Nonetheless, they are nasty</strong></del></span> <span
class="inserted"><ins><em>user's file system for music files, copies them to an
Apple server,</em></ins></span>
- and <span class="removed"><del><strong>wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>deletes
them</a>.</p>
+
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
+ the user's file system for music files, copies them to an Apple server,
+ and deletes them</a>.</p>
</li>
<li id="M201602050">
<p>iOS version 9 for iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>.</em></ins></span> Apple <span
class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>eventually backed off from this policy under
+ Apple</a>. Apple eventually backed off from this policy under
criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
@@ -673,38 +675,51 @@
forcibly install the upgrade but the downloading alone caused lots
of trouble.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
-
-<ul>
- <li><p>Apple Siri</strong></del></span>
<span class="inserted"><ins><em><li id="M201412040">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
- about</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the</em></ins></span> music <span
class="removed"><del><strong>charts if you're not an</strong></del></span>
<span class="inserted"><ins><em>that users had got from internet music
+ <p>Apple <a
+
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
stores that competed with iTunes</a>.</p>
</li>
<li id="M200709270">
<p><a
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
- An</em></ins></span> Apple <span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” bricked iPhones that
had been
+ An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently
intentional.</p></em></ins></span>
- </li>
+ censorship</a>. All this was apparently intentional.</p>
+ </li></em></ins></span>
</ul>
-<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3></strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3>
+
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
<ul class="blurbs">
- <li id="M201910130"></em></ins></span>
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>their use of</strong></del></span> the <span
class="removed"><del><strong>software. This section reports
examples</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites</em></ins></span> of <span
class="removed"><del><strong>hard sell</strong></del></span> <span
class="inserted"><ins><em>political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>other unjust commercial tactics by Apple.</p>
+
+<ul>
+ <li><p>Apple Siri
+ <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
+ about music charts if you're not an Apple Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>Hong Kong, thus endangering their
lives.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="sabotage">Apple Sabotage</h3></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130"></em></ins></span>
<p>The <span
class="removed"><del><strong>wrongs</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
@@ -1141,7 +1156,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/21 07:00:13 $
+$Date: 2019/10/31 12:01:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-apple.nl.po 21 Oct 2019 07:00:13 -0000 1.80
+++ malware-apple.nl.po 31 Oct 2019 12:01:57 -0000 1.81
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -930,6 +930,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- malware-apple.pot 21 Oct 2019 07:00:13 -0000 1.90
+++ malware-apple.pot 31 Oct 2019 12:01:57 -0000 1.91
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -763,6 +763,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a "
+"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\">
"
+"sends browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to "
+"“fraudulent” websites. Since Tencent collaborates with the "
+"Chinese government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a "
"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- malware-apple.ru.po 21 Oct 2019 12:00:35 -0000 1.232
+++ malware-apple.ru.po 31 Oct 2019 12:01:57 -0000 1.233
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-21 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -1087,6 +1088,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- nl.po 30 Oct 2019 17:00:14 -0000 1.156
+++ nl.po 31 Oct 2019 12:01:57 -0000 1.157
@@ -1558,6 +1558,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- pl.po 30 Oct 2019 17:00:15 -0000 1.155
+++ pl.po 31 Oct 2019 12:01:57 -0000 1.156
@@ -1278,6 +1278,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- pot 30 Oct 2019 17:00:15 -0000 1.154
+++ pot 31 Oct 2019 12:01:57 -0000 1.155
@@ -1135,6 +1135,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary-surveillance.de-diff.html 19 Oct 2019 10:32:22 -0000
1.100
+++ proprietary-surveillance.de-diff.html 31 Oct 2019 12:01:58 -0000
1.101
@@ -646,7 +646,13 @@
to
<span class="removed"><del><strong>users' text messages.</dd>
- <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN
developers</strong></del></span> have <span
class="removed"><del><strong>confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em>GPS.)</p>
</li>
</ul>
@@ -657,63 +663,121 @@
</div>
<ul class="blurbs">
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China</em></ins></span> to the
<span class="removed"><del><strong>UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>the
+ users. The stated purpose of the JS injection is</strong></del></span>
<span class="inserted"><ins><em>check URLs that possibly
correspond</em></ins></span> to <span class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span>
+ <span class="inserted"><ins><em>“fraudulent” websites. Since
Tencent collaborates
+ with</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that</strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
+ contains</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
+ originating from single IP addresses, the government can identify
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
+ proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information to third
parties</a>.</p></em></ins></span>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
+ and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
+ trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
+ delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
+ used for.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
- <li id="M201709210">
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
+ no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p></em></ins></span>
</li>
- <li id="M201609280">
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -887,7 +951,7 @@
<p>Merely asking the “consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
+ reading the “Terms</em></ins></span> and Conditions” that
<span class="removed"><del><strong>spell out</strong></del></span> <span
class="inserted"><ins><em>spell out what
they are “consenting” to. Google should clearly and
honestly identify the information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
@@ -1281,8 +1345,7 @@
<li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1292,80 +1355,47 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span class="removed"><del><strong>read logs
- for other</strong></del></span> <span class="inserted"><ins><em>zero
price.</p>
+ referring to zero price.</p>
</li>
<li id="M201707270">
- <p>20 dishonest Android</em></ins></span> apps <span
class="inserted"><ins><em>recorded <a
+ <p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="removed"><del><strong>also core
system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- and may turn</strong></del></span> <span
class="inserted"><ins><em>sent</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>and text messages and emails</em></ins></span> to
<span class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
- worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+ for the snooping of these apps.</p>
- <p>On</em></ins></span> the <span class="removed"><del><strong>JS
injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google</em></ins></span> have
- <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+ <p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app does
- JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A</strong></del></span>
study
- <span class="inserted"><ins><em>the source code somehow to determine
whether they mistreat users</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or
less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>app developers are
clever
- enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>paid proprietary</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
-
- <p>But since Google itself develops malicious</em></ins></span>
apps, <span class="removed"><del><strong>it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>we cannot
trust
- Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>source
code to</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
- </li>
+ to inspect executable proprietary apps to see</em></ins></span> what they
<span class="inserted"><ins><em>do.</p>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705230"></em></ins></span>
- <p>Apps for BART <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on users</a>.</p>
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers</em></ins></span>
are <span class="removed"><del><strong>“consenting”
to.</strong></del></span> <span class="inserted"><ins><em>clever
+ enough to outsmart the checking.</p>
+
+ <p>But since</em></ins></span> Google <span
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
+ </li>
+
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1373,14 +1403,11 @@
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
+ <li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
- </p></strong></del></span>
- <span class="inserted"><ins><em>programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
<li id="M201704260">
@@ -1397,74 +1424,61 @@
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p></em></ins></span>
+ If</em></ins></span> the <span class="removed"><del><strong>information it
collects on users, instead</strong></del></span> <span
class="inserted"><ins><em>fine print</em></ins></span> of <span
class="removed"><del><strong>hiding</strong></del></span> <span
class="inserted"><ins><em>the app said that users gave consent for this,
+ would that make</em></ins></span> it <span class="removed"><del><strong>in
an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>truly protect
people's privacy, we must prevent Google
+and other companies from getting this personal information
in</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
+ the <span class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>app to
snoop at all</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
- <span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>Android apps can collude
+ to transmit users' personal data to servers.</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+ <li id="M201703300">
+ <p>Verizon <a
+
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
+ about</em></ins></span> the users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
- <span class="inserted"><ins><em><li id="M201703300">
- <p>Verizon</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>it will</a> pre-install
- on some</em></ins></span> of <span class="removed"><del><strong>users is
not enough
-to legitimize actions like this. At this point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>its
phones. The app will give Verizon</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>same
information
- about the users' searches</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to.</strong></del></span> Google <span
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
+ <p>Even if you disable</strong></del></span> <span
class="inserted"><ins><em>searches that</em></ins></span> Google <span
class="removed"><del><strong>Maps</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>app is <a
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>only one
phone</a>,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in</strong></del></span> the
<span class="removed"><del><strong>first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>user must
- explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>spyware is
+ being pre-installed on only one phone</a>,</em></ins></span> and
<span class="removed"><del><strong>location tracking, you</strong></del></span>
<span class="inserted"><ins><em>the user</em></ins></span> must
+ <span class="removed"><del><strong>disable Google Play itself to
completely stop</strong></del></span>
+ <span class="inserted"><ins><em>explicitly opt-in before</em></ins></span>
the <span class="removed"><del><strong>tracking. This is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
<li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app</em></ins></span> tracks <span
class="removed"><del><strong>the users'</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'</em></ins></span>
- movements <span class="removed"><del><strong>without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>before</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
- <p>This</em></ins></span> example <span
class="removed"><del><strong>of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how
“getting</em></ins></span> the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>user's
+ <p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>protection against
massive surveillance.</p></em></ins></span>
@@ -3601,7 +3615,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:32:22 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary-surveillance.de.po 19 Oct 2019 10:32:22 -0000 1.315
+++ proprietary-surveillance.de.po 31 Oct 2019 12:01:58 -0000 1.316
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1237,6 +1237,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-surveillance.es.po 20 Oct 2019 10:34:29 -0000 1.9
+++ proprietary-surveillance.es.po 31 Oct 2019 12:01:58 -0000 1.10
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-10-20 12:12+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -904,6 +905,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.482
retrieving revision 1.483
diff -u -b -r1.482 -r1.483
--- proprietary-surveillance.fr.po 21 Oct 2019 09:29:41 -0000 1.482
+++ proprietary-surveillance.fr.po 31 Oct 2019 12:01:58 -0000 1.483
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-10-21 11:28+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -902,6 +903,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.it-diff.html 19 Oct 2019 10:32:22 -0000
1.167
+++ proprietary-surveillance.it-diff.html 31 Oct 2019 12:01:58 -0000
1.168
@@ -633,14 +633,10 @@
<p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
yet another example of nonfree software pretending</strong></del></span>
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
+ <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones
+ to have GPS.)</p>
</li>
-
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -649,31 +645,49 @@
</div>
<ul class="blurbs">
- <li id="M201905280">
- <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the most popular Android</strong></del></span>
<span class="inserted"><ins><em>Apple's supposed commitment to
- privacy, iPhone</em></ins></span> apps <span
class="inserted"><ins><em>contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable</strong></del></span> <span class="inserted"><ins><em>Tencent
Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent
collaborates</em></ins></span>
+ with <span class="removed"><del><strong>free software.</p>
+
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android
apps</a>.</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+ <li><p>More than 73% of</strong></del></span> the <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black
list</em></ins></span> most <span class="removed"><del><strong>popular Android
apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>certainly
+ contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>lives.</p></em></ins></span>
+ </li>
- <p>The article <span class="removed"><del><strong>should not have
described these apps as
- “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify,</em></ins></span> The <span
class="removed"><del><strong>clear way to say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>the app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="inserted"><ins><em>most nonfree apps contain
+ <p>The article should not have described these</strong></del></span>
+ <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps
<span class="removed"><del><strong>as
+ “free”—they</strong></del></span> <span
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span
class="removed"><del><strong>not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>takes for granted
that</strong></del></span> <span class="inserted"><ins><em>mentions specific
examples: Microsoft OneDrive,
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ and DoorDash. But it</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps
contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span class="inserted"><ins><em>case
of DoorDash). Once this information
- is collected by the company, there</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers
have</strong></del></span> no <span class="removed"><del><strong>right to
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is</em></ins></span> no <span
class="removed"><del><strong>right to
analyze</strong></del></span> <span
class="inserted"><ins><em>telling</em></ins></span> what <span
class="removed"><del><strong>users are doing or how. “Analytics”
tools that snoop are
just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>it will be
used for.</p></em></ins></span>
@@ -689,16 +703,16 @@
this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
send personal data to Motorola</a>.</p>
</li>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <li><p>Some manufacturers add a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
@@ -834,21 +848,22 @@
<span class="inserted"><ins><em><li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or
it</em></ins></span>
+ is <span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing</em></ins></span> also <span
class="removed"><del><strong>a feature for web sites to track users, which
is</strong></del></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
+ enabled</em></ins></span> by default</a>. (That article talks about
iOS 6, but it is
still true in iOS 7.)</p>
</li>
@@ -862,12 +877,12 @@
turned off.</p>
</li>
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>ID (<a
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
</li>
<li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
@@ -896,55 +911,56 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201812060">
<p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
+ by sending hidden text messages which enable them to
turn</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the <span class="removed"><del><strong>phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>track location even while
- in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>location data
while in
+ <p>An Android phone was observed</em></ins></span> to <span
class="inserted"><ins><em>track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>data,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="removed"><del><strong>contact list. This malware is
designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
</li>
- <li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable</em></ins></span> phones <span
class="removed"><del><strong>come with</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+ tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
+ <li id="M201507030">
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
+ that users can't delete</a>, and they send so much data
that</em></ins></span> their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
of some
@@ -952,18 +968,18 @@
<li><p>A Motorola phone
<a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>kind.</p></em></ins></span>
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
</li>
- <li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The
Wall</em></ins></span> Street
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308010">
+ <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
@@ -973,89 +989,144 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware is present in some Android devices when they are
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
+ the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
+<ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
<span class="inserted"><ins><em><li id="M201307250">
- <p>A Motorola phone <a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data
in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
- <p>Google Play intentionally sends app developers <a
+ <span class="removed"><del><strong><li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150">
+ <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>that it will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ the personal details</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>users that
install</em></ins></span> the <span class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>“consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>Google normally gets
when</strong></del></span> <span class="inserted"><ins><em>spell out
what</em></ins></span>
+ they <span class="removed"><del><strong>use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>are “consenting” to. Google should
clearly</em></ins></span> and
+ <span class="inserted"><ins><em>honestly identify</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>information it collects</em></ins></span> on
<span class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span>
+ <span class="inserted"><ins><em>hiding it</em></ins></span> in <span
class="removed"><del><strong>the phone,</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
- hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
+ <p>However, to truly protect people's privacy, we must prevent
Google</em></ins></span>
+ and <span class="inserted"><ins><em>other companies from getting this
personal information</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
</li>
- <li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general</em></ins></span> surveillance <span
class="removed"><del><strong>software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various
sites</strong></del></span> <span
class="inserted"><ins><em>package</em></ins></span> such as <span
class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>Carrier IQ</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp appears to do</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>suggests you to share</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>picture you take
according</strong></del></span> <span class="inserted"><ins><em>e-reader used
by most US libraries, <a
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</strong></del></span>
data <span class="inserted"><ins><em>to Adobe</a>. Adobe's
“excuse”: it's
+ send lots of data</em></ins></span> to <span
class="removed"><del><strong>who
+ is</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>Kindle: <a
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database,</strong></del></span> <span
class="inserted"><ins><em>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what
time</a>.</p></em></ins></span>
+ report even</em></ins></span> which <span
class="removed"><del><strong>means the pictures are likely to be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
</li>
-
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1072,25 +1143,27 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact</em></ins></span> that <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
- makes</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
-
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The
app will give Verizon</strong></del></span> <span
class="inserted"><ins><em>nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for</em></ins></span> the <span class="removed"><del><strong>users'
searches that Google normally gets when
- they use its search engine.</p>
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers and face-recognition
+ algorithms.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less nasty.</p>
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often a legal threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore,</strong></del></span> <span
class="inserted"><ins><em>money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>injustice of nonfree
software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1099,368 +1172,316 @@
<ul class="blurbs">
<li id="M201910130">
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="inserted"><ins><em>Great Nation”</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant</em></ins></span> it
<a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
- internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>Android version was found to contain a
- back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using
this</em></ins></span>
- app <span class="removed"><del><strong>remains spyware—an
“optional” piece of spyware</strong></del></span> is
- <span class="removed"><del><strong>still spyware.</p>
- </li>
+ access</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>the
phone's microphone, photos, text messages, contacts, and
+ internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>Android version was found to
contain</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing
developers</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether</strong></del></span> <span class="inserted"><ins><em>run any
code</em></ins></span> they <span class="removed"><del><strong>want that.
This</strong></del></span> <span class="inserted"><ins><em>wish in the users'
+ phone, as “superusers.” Downloading and using this
+ app</em></ins></span> is <span class="removed"><del><strong>a typical
example</strong></del></span> <span class="inserted"><ins><em>mandatory at some
workplaces.</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version</em></ins></span> of the <span
class="removed"><del><strong>attitude of the proprietary software industry
towards
+ those they have subjugated.</p>
- <li><p>The Meitu photo-editing
- app</strong></del></span> <span class="inserted"><ins><em>mandatory at some
workplaces.</p>
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>at least
is visible and
+ optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes
a clarification
- saying that the tests were</em></ins></span> only
- <span class="removed"><del><strong>can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>performed</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>the Android version</em></ins></span>
- of <span class="removed"><del><strong>data in</strong></del></span> the
<span class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
- <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this kind of
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>tests were only performed</em></ins></span> on the
<span class="removed"><del><strong>user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
+ of <span class="removed"><del><strong>whether</strong></del></span> the
<span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>app, and
that, according</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
+ Apple's operating system.”</p></em></ins></span>
</li>
- <li id="M201909091">
- <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>,</em></ins></span> after
<span class="inserted"><ins><em>tricking them
- into giving</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
+ <span class="inserted"><ins><em><li id="M201909091"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when</em></ins></span> it <span
class="removed"><del><strong>asked the user to
+ approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
+ into giving</em></ins></span> the app <span
class="removed"><del><strong>developer but did not
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>its
+ functionalities.</p>
</li>
- <li><p>Google's new voice messaging</strong></del></span> app
<span class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>broad permissions in order to use one of its
- functionalities.</p></em></ins></span>
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"></em></ins></span>
+ send <span class="removed"><del><strong>any
information</strong></del></span> <span class="inserted"><ins><em>intimate
details of users' lives</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</strong></del></span>
- <span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.</p>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's</strong></del></span>
- <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>Maya</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take
according</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
- </li>
-
- <li id="M201909060">
- <p>Keeping track of</em></ins></span> who <span
class="inserted"><ins><em>downloads a proprietary
- program</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <span class="inserted"><ins><em><li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a</em></ins></span>
+ proprietary <span class="removed"><del><strong>GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>program for
adjusting a certain telescopic rifle sight.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>list of all</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
+ <li><p>Angry Birds</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not</em></ins></span> be
- <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has
installed
+ <p>With a free program there would not be a list of who has installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
- of <span class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>operating system, in
order</em></ins></span> to <span class="inserted"><ins><em>gather as much
private data as
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="inserted"><ins><em>privacy-enhancing features
+ of</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>operating
system, in order</em></ins></span> to <span class="removed"><del><strong>spy
through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>software we run.</p></em></ins></span>
+ having control over the software we run.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>allow
them access</em></ins></span> to <span class="removed"><del><strong>realize
that it is nasty.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p></em></ins></span>
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <p>This <span class="removed"><del><strong>article shows
the</strong></del></span> <span class="inserted"><ins><em>involves an
apparently unintentional weakness in Android,
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>Android,
exploited intentionally by malicious apps.</p>
</li>
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
+ <li id="M201905300"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too,</em></ins></span> as <span
class="inserted"><ins><em>you must expect from nonfree
+ <p>It snoops on users, too, as you must expect from nonfree
programs.</p>
</li>
<li id="M201905060">
- <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many</strong></del></span> proprietary <span
class="removed"><del><strong>apps for mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>phone
app</a> to be allowed into</em></ins></span>
- the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>event.</p>
+ requirement</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
- <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
- sensitive data, including user's location</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
- </li>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a> to be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>toys with</strong></del></span>
<span class="inserted"><ins><em>event.</p>
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list,
and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p></em></ins></span>
+ <p>This app is</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>even speak
+ into</strong></del></span> <span class="inserted"><ins><em>contact list,
and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
- users to say “I agree”. That is no excuse for
malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+ <p>The app was reporting the temperature of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute
by
+ minute (thus, indirectly, whether</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="removed"><del><strong>was
surrounded by a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
+ standard with which manufacturers would</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to</em></ins></span> make <span
class="removed"><del><strong>statements about</strong></del></span> their <span
class="removed"><del><strong>products, rather than free software which users
could have
+ checked and changed.</p>
- <p>The FTC criticized this</strong></del></span> <span
class="inserted"><ins><em>women's rights to equal employment
- and freedom to make their own pregnancy choices. Don't use
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em>that does more or less</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
running Goggle apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
+ saves</em></ins></span> the data <span class="removed"><del><strong>may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>for years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker,</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
+ the <span class="inserted"><ins><em>location</em></ins></span> data <span
class="removed"><del><strong>broker would have been able to figure out
+ who the user was.</p>
- <p>Nonfree software in the phone has</em></ins></span> to
- <span class="removed"><del><strong>approve</strong></del></span> <span
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span>
- <span class="inserted"><ins><em>the location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of
C$4m</a></strong></del></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
</li>
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come</em></ins></span> with <span
class="removed"><del><strong>microphones</strong></del></span> <span
class="inserted"><ins><em>a huge number of</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="inserted"><ins><em>sensitive data without
users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="inserted"><ins><em>on</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access to
- the network but no direct access to the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
- surveillance on which</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>data, or
pass it on</em></ins></span> to <span class="inserted"><ins><em>user-installed
apps that have</em></ins></span> access <span
class="inserted"><ins><em>to</em></ins></span>
+ the <span class="removed"><del><strong>data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these
conversations</strong></del></span> <span class="inserted"><ins><em>user has
absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"></em></ins></span>
- send <span class="inserted"><ins><em>sensitive personal data to third
parties</a>, which can use it
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand.
In</em></ins></span> any <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>case,
- “consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
<p>It shows that no one can trust a nonfree program, not even the
developers of other nonfree programs.</p>
</li>
<li id="M201902140">
- <p>The AppCensus database gives</em></ins></span> information on
<a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
- <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps</em></ins></span> have
- <span class="removed"><del><strong>checked and changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
- the user <span class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws
were</em></ins></span>
- found <span class="inserted"><ins><em>as well.</p>
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
- <p>Moreover,</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>previous investigation had found that <a
+ <p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
@@ -1472,33 +1493,21 @@
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>users
of what it will do
- with</em></ins></span> the <span class="removed"><del><strong>manufacturer
and</strong></del></span> <span class="inserted"><ins><em>data.</p>
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
- <p>We think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>FBI could listen
to these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span> <span
class="inserted"><ins><em>company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
+ <li id="M201812290">
<p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
report on the user's actions to Facebook</a>.</p>
@@ -2101,7 +2110,7 @@
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
+ surveillance, even if it were not hidden as it</em></ins></span> was <span
class="removed"><del><strong>unacceptable</strong></del></span> <span
class="inserted"><ins><em>in these TVs,
does not legitimize the surveillance.</p>
</li>
@@ -2154,7 +2163,7 @@
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>its TVs snoop on what
+ used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2165,7 +2174,9 @@
Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
+ <p>Speech recognition is not to be trusted unless it is
done</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
@@ -2194,23 +2205,23 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>place new items</strong></del></span>
<span class="inserted"><ins><em>report what the
+ <p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>other devices on the user's local
network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="inserted"><ins><em>stop this, but any
+ product could</em></ins></span> spy <span class="inserted"><ins><em>this
way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -2220,10 +2231,14 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
+
+
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
<div <span class="removed"><del><strong>class="big-section">
@@ -3359,7 +3374,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:32:22 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary-surveillance.it.po 19 Oct 2019 10:32:23 -0000 1.328
+++ proprietary-surveillance.it.po 31 Oct 2019 12:01:58 -0000 1.329
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1216,6 +1216,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary-surveillance.ja-diff.html 19 Oct 2019 10:32:23 -0000
1.183
+++ proprietary-surveillance.ja-diff.html 31 Oct 2019 12:01:58 -0000
1.184
@@ -629,34 +629,48 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span>
+ <li><p>iPhones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201905280">
- <p>In spite</em></ins></span> of <span
class="removed"><del><strong>personal data to</strong></del></span> Apple's
<span class="removed"><del><strong>servers</a>. Big Brother can
- get them from there.</p>
+ <li id="M201910131">
+ <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing</em></ins></span> data <span
class="removed"><del><strong>to Apple's servers</a>. Big Brother can
+ get them</strong></del></span> from <span
class="removed"><del><strong>there.</p>
</li>
<li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</strong></del></span> <span
class="inserted"><ins><em>supposed commitment to
- privacy, iPhone apps contain trackers</em></ins></span> that <span
class="removed"><del><strong>the user types into it</a>; the server
records these numbers for</strong></del></span> <span
class="inserted"><ins><em>are busy</em></ins></span> at <span
class="removed"><del><strong>least 30
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
days.</p>
</li>
- <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>night</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
+ <li><p>Users cannot make an</strong></del></span> Apple <span
class="removed"><del><strong>ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>devices in China</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>it.</p>
</li>
- <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
+ <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with</em></ins></span> the <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list</em></ins></span> most <span
class="removed"><del><strong>popular iOS apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>certainly
+ contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with</strong></del></span> <span
class="inserted"><ins><em>lives.</p>
+ </li>
+
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information to</em></ins></span> third <span
class="removed"><del><strong>parties.</p></strong></del></span> <span
class="inserted"><ins><em>parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM),</em></ins></span> the <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that</em></ins></span> most <span
class="removed"><del><strong>popular iOS</strong></del></span> <span
class="inserted"><ins><em>nonfree</em></ins></span> apps <span
class="inserted"><ins><em>contain
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
@@ -665,16 +679,15 @@
</li>
<li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>Bluetooth the obvious way <a
+ “turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
@@ -692,7 +705,7 @@
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="removed"><del><strong>their users
with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -762,7 +775,7 @@
get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
<span class="inserted"><ins><em><li id="M201312300">
<p><a
@@ -779,7 +792,7 @@
</li>
<li id="M201210170">
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a feature</em></ins></span> for web sites to track
users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
@@ -829,55 +842,55 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201812060">
<p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
+ by sending hidden text messages which enable them to
turn</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the <span class="removed"><del><strong>phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>track location even while
- in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>location data
while in
+ <p>An Android phone was observed</em></ins></span> to <span
class="inserted"><ins><em>track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>location</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>data,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="removed"><del><strong>contact list. This malware is
designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
</li>
- <li id="M201611150">
- <p>Some portable phones <a
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable</em></ins></span> phones <span
class="removed"><del><strong>come</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+ sold</em></ins></span> with <span class="inserted"><ins><em>spyware
sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
+ <li id="M201507030">
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
+ that users can't delete</a>, and they</em></ins></span> send so much
data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
of some
@@ -967,18 +980,19 @@
<li id="M201603080">
<p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>user's consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>e-reader used by most US
libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
@@ -989,10 +1003,10 @@
<span class="inserted"><ins><em><li id="M201212030">
<p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on</strong></del></span>
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
+ report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>users post on various sites
such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
@@ -1198,16 +1212,27 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>that does more or less</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage to spy through it
too</a>.
- Here's information</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying</em></ins></span> on <span class="inserted"><ins><em>you is
available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>that does more
or less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Goggle apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
More about NSA app spying</a>.</p>
@@ -1222,52 +1247,41 @@
<ul>
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is</em></ins></span> being <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>developed</a>.</p>
- </li>
-
- <li id="M201904130">
- <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people use it</a>.</p>
-
- <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em>Android phones
and iPhones
- running Goggle apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
-
- <p>Nonfree software in the phone has to</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it sells</strong></del></span> <span class="inserted"><ins><em>responsible
for sending</em></ins></span>
- the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued</strong></del></span> <span class="inserted"><ins><em>be
responsible</em></ins></span> for <span class="removed"><del><strong>collecting
lots</strong></del></span> <span class="inserted"><ins><em>sending
+ the location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker can
figure out who the user is.</p>
- </li>
-
- <li><p>A computerized
- vibrator</strong></del></span> <span class="inserted"><ins><em>huge
number of</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>proprietary control
app</a>.</p>
-
- <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
- </li>
+ <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>personal information about how
+ people use it</a>.</p>
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the</strong></del></span> <span
class="inserted"><ins><em>have access to sensitive</em></ins></span> data <span
class="inserted"><ins><em>without
+ users' knowledge</a>. These hidden apps</em></ins></span> may <span
class="removed"><del><strong>be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>either call home with
+ the data, or pass</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access
to</em></ins></span>
+ the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>a
+ data broker,</strong></del></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>data. This results in
massive
+ surveillance on which</em></ins></span> the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>has absolutely no control.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control app</a>.</p>
+
+ <p>The app reports the temperature</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found that 19 of them
<a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+ send sensitive personal data to third parties</a>, which can
use</em></ins></span> it
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought,</em></ins></span>
it is <span class="removed"><del><strong>surrounded by</strong></del></span>
<span class="inserted"><ins><em>buried in
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
lengthy terms of service that are difficult to understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
@@ -1293,124 +1307,84 @@
<a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
<span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information</em></ins></span> on
<span class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
+ <p>The AppCensus database gives information</em></ins></span> on
<span class="removed"><del><strong>children and adults.</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>Low
Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>preventing nonfree software developers
from including malware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
<li><p></strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em><a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>total) link this ID to hardware
identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>in apparent
violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
+ <span class="inserted"><ins><em>their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>them
was designed to make uninstallation
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
+ them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps
if</em></ins></span> they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>haven't yet, but they should also stay
away from nonfree apps</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
+ there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902010">
+ <li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
+</p></li>
</ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
+ source code—often used for invasive advertising—that could
potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
@@ -1419,44 +1393,18 @@
the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p>It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>will do
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
with the data.</p>
<p>We think that lawsuit is about a side issue. What the company does
@@ -1465,204 +1413,110 @@
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
+ Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the user's actions to Facebook</a>.</p>
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not</strong></del></span>
<span class="inserted"><ins><em>the app; others</em></ins></span> only <span
class="inserted"><ins><em>say that</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>user is
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>has a Facebook
- account.</p></em></ins></span>
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>users that have deleted
them</a>.</p></em></ins></span>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
- <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
- and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article,</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This</em></ins></span> is <span class="removed"><del><strong>not
- really a matter of</strong></del></span> <span
class="inserted"><ins><em>evidence that</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>apps generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
- Android</em></ins></span> by <span class="removed"><del><strong>malware.
The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em><a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,</em></ins></span>
- and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary apps by
getting apps from the free software
- only</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user</em></ins></span> if <span class="inserted"><ins><em>an app
contains anti-features</a>.</p>
+ the user if an app contains anti-features</a>.</p>
</li>
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>get the data
- and hand it over, the state can store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
- <span class="inserted"><ins><em>other but not</em></ins></span> to <span
class="inserted"><ins><em>the server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up to me</strong></del></span> <span class="inserted"><ins><em>physical
store by noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server. Note</em></ins></span> that <span
class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't
expect</strong></del></span> this <span class="removed"><del><strong>has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>article misuses the words
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span class="removed"><del><strong>get
users' formal
- consent before collecting personal data</strong></del></span> <span
class="inserted"><ins><em>zero price.</p>
+ referring to zero price.</p>
</li>
<li id="M201707270">
@@ -1678,24 +1532,22 @@
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
- are <span class="removed"><del><strong>totally inadequate.
- And</strong></del></span> <span
class="inserted"><ins><em>malicious</a>.</p>
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
+ to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If it did</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>good job of
this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source
code</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
@@ -1712,11 +1564,8 @@
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by</em></ins></span>
TV <span class="removed"><del><strong>will
- not work.”</p>
-
- <p>Proper laws</strong></del></span>
- <span class="inserted"><ins><em>programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
<li id="M201704260">
@@ -1729,10 +1578,10 @@
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app</em></ins></span> would <span
class="removed"><del><strong>say</strong></del></span> <span
class="inserted"><ins><em>record the names of the audio files users listen to
+ the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
@@ -2311,28 +2160,43 @@
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
+ <p>The article focuses on how Ring used to let individual employees
look</em></ins></span>
+ at <span class="removed"><del><strong>Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
+ <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
@@ -2342,27 +2206,43 @@
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
- into one.</p>
+ into one.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201711100">
- <p>A remote-control sex toy was found to make <a
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
@@ -2370,7 +2250,18 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>its users
through the proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
@@ -2379,33 +2270,78 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
- and changed.</p>
+ and changed.</p></em></ins></span>
- <p>The company that made the vibrator <a
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>company that made</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If</em></ins></span> it <span
class="inserted"><ins><em>had sold the data</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the
+ user <span class="removed"><del><strong>reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>pay a total
of C$4m</a></em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>nonfree software are</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to</em></ins></span> access <span
class="removed"><del><strong>its computers remotely</strong></del></span> <span
class="inserted"><ins><em>the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
@@ -2413,12 +2349,15 @@
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
</li>
<li id="M201502180">
@@ -2437,8 +2376,10 @@
<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ to snoop on other people, DJI</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>in many cases</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2452,121 +2393,182 @@
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
+ when</em></ins></span> it <span class="removed"><del><strong>demands blind
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to
listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
- users were easily identified from these recordings.</p>
+ users were easily identified</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ <p>Even if</strong></del></span> <span
class="inserted"><ins><em>these recordings.</p>
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+ <p>Since Google “Assistant” uses proprietary software,
there is</em></ins></span> no <span class="removed"><del><strong>one
connects</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
</li>
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <p>Amazon Alexa collects a lot more</em></ins></span> information
<span class="removed"><del><strong>about drivers' movements</a>,
+ which</strong></del></span> <span class="inserted"><ins><em>from users
+ than</em></ins></span> is <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings</em></ins></span> made <span
class="removed"><del><strong>available to car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be accessed</em></ins></span> by <span
class="removed"><del><strong>malware. The</strong></del></span>
+ <span class="inserted"><ins><em>advertising companies and government
agencies. In</em></ins></span> other
+ <span class="removed"><del><strong>cases mentioned</strong></del></span>
<span class="inserted"><ins><em>words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
+ the devices</em></ins></span> are <span class="removed"><del><strong>done
by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>tethered to. Moreover, they are made available to
Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>).</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>.</em></ins></span>
The <span class="removed"><del><strong>company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span>
to <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data
<span class="inserted"><ins><em>processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ tell you how</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>where it's
done”), users have no way
+ to know what happens to</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201902080">
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
+ communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>the user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
</li>
- <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
- paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
- paid for.</p>
-
- <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
- specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>users, and
involves totally unacceptable
- restrictions</em></ins></span> in <span
class="removed"><del><strong>detail</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon
device,</em></ins></span>
- and
- <span class="removed"><del><strong>link</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+ and</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for</em></ins></span> them <span
class="removed"><del><strong>your IP address</a> so</strong></del></span>
<span class="inserted"><ins><em>to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>advertisers can
track</strong></del></span> <span class="inserted"><ins><em>country,
- do</em></ins></span> you
- <span class="removed"><del><strong>across devices.</p>
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>think Amazon would have the moral
fiber</em></ins></span> to <span class="removed"><del><strong>turn this
off,</strong></del></span> <span class="inserted"><ins><em>say no?</p>
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
- <p>These crackers are probably hackers too,</em></ins></span> but
<span class="removed"><del><strong>having it enabled</strong></del></span>
<span class="inserted"><ins><em>please <a
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <li id="M201804140">
+ <span class="inserted"><ins><em><li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span>
- <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p></em></ins></span>
+ offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
+ sending usage data back over the Internet</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
- <p>Lots of “smart” products are designed <a
+ <li id="M201706204">
+ <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="inserted"><ins><em>everyone
in</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
+ link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span
class="removed"><del><strong>now</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
<p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all users to
new combined surveillance by default.</p></li>
@@ -3218,7 +3220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:32:23 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.309
retrieving revision 1.310
diff -u -b -r1.309 -r1.310
--- proprietary-surveillance.ja.po 19 Oct 2019 10:32:23 -0000 1.309
+++ proprietary-surveillance.ja.po 31 Oct 2019 12:01:58 -0000 1.310
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -908,6 +908,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary-surveillance.pot 19 Oct 2019 10:32:23 -0000 1.249
+++ proprietary-surveillance.pot 31 Oct 2019 12:01:58 -0000 1.250
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -658,6 +658,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a "
+"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\">
"
+"sends browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to "
+"“fraudulent” websites. Since Tencent collaborates with the "
+"Chinese government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a "
"href=\"https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\">
"
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.576
retrieving revision 1.577
diff -u -b -r1.576 -r1.577
--- proprietary-surveillance.ru.po 19 Oct 2019 15:58:38 -0000 1.576
+++ proprietary-surveillance.ru.po 31 Oct 2019 12:01:58 -0000 1.577
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 10:25+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -891,6 +892,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
"trackers that are busy at night <a href=\"https://www.oregonlive.com/"
"opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html\"> "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary.de-diff.html 28 Oct 2019 07:01:14 -0000 1.137
+++ proprietary.de-diff.html 31 Oct 2019 12:01:58 -0000 1.138
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -130,9 +130,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -163,10 +163,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -188,6 +188,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -249,14 +261,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription
can be
- turned into a tool for sabotage.</p>
- </li>
</ul></em></ins></span>
@@ -318,7 +322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 07:01:14 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary.de.po 28 Oct 2019 07:01:14 -0000 1.179
+++ proprietary.de.po 31 Oct 2019 12:01:58 -0000 1.180
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -455,6 +455,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -531,14 +544,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.es.po 29 Oct 2019 10:55:47 -0000 1.239
+++ proprietary.es.po 31 Oct 2019 12:01:58 -0000 1.240
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -312,6 +313,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -434,19 +448,6 @@
"La obediencia a «leyes locales» relativas a lo que la gente puede hacer con
"
"el software no es excusa para censurar qué software puede utilizar la gente."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"Adobe ha <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\">cancelado las "
-"suscripciones de software de todos los usuarios de Venezuela</a>. Esto "
-"muestra la manera en que un requisito de suscripción pude convertirse en un "
-"instrumento de sabotaje."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -524,6 +525,18 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-"
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "Adobe ha <a href=\"https://www.bleepingcomputer.com/news/software/adobe-"
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\">cancelado las "
+#~ "suscripciones de software de todos los usuarios de Venezuela</a>. Esto "
+#~ "muestra la manera en que un requisito de suscripción pude convertirse en "
+#~ "un instrumento de sabotaje."
+
+#~ msgid ""
#~ "A very popular app found in the Google Play store contained a module that "
#~ "was designed to <a href=\"https://arstechnica.com/information-"
#~ "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary.fr.po 28 Oct 2019 07:31:59 -0000 1.286
+++ proprietary.fr.po 31 Oct 2019 12:01:58 -0000 1.287
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-10-28 08:31+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -431,18 +445,6 @@
"logiciel n'est pas une excuse pour censurer quels logiciels ils peuvent "
"utiliser."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"Adobe a <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\">résilié tous les "
-"abonnements à ses logiciels au Venezuela</a>. Cela montre comment un "
-"abonnement obligatoire peut être transformé en instrument de sabotage. "
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -515,3 +517,14 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-"
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "Adobe a <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
+#~ "ban-users-from-venezuela-due-to-us-executive-order\">résilié tous les "
+#~ "abonnements à ses logiciels au Venezuela</a>. Cela montre comment un "
+#~ "abonnement obligatoire peut être transformé en instrument de sabotage. "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary.it-diff.html 28 Oct 2019 07:01:17 -0000 1.149
+++ proprietary.it-diff.html 31 Oct 2019 12:01:58 -0000 1.150
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
@@ -162,10 +162,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -187,6 +187,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -248,14 +260,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription
can be
- turned into a tool for sabotage.</p>
- </li>
</ul></em></ins></span>
@@ -317,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 07:01:17 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.it.po 28 Oct 2019 07:01:17 -0000 1.188
+++ proprietary.it.po 31 Oct 2019 12:01:58 -0000 1.189
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -459,6 +459,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -535,14 +548,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.ja-diff.html 28 Oct 2019 07:01:17 -0000 1.152
+++ proprietary.ja-diff.html 31 Oct 2019 12:01:58 -0000 1.153
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -129,16 +129,16 @@
</td>
<td>
<ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -246,14 +258,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription
can be
- turned into a tool for sabotage.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 07:01:17 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.ja.po 28 Oct 2019 07:01:17 -0000 1.172
+++ proprietary.ja.po 31 Oct 2019 12:01:58 -0000 1.173
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -319,6 +319,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -395,14 +408,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.nl-diff.html 28 Oct 2019 07:01:17 -0000 1.150
+++ proprietary.nl-diff.html 31 Oct 2019 12:01:58 -0000 1.151
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
@@ -187,6 +187,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -248,14 +260,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription
can be
- turned into a tool for sabotage.</p>
- </li>
</ul></em></ins></span>
@@ -317,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 07:01:17 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.nl.po 28 Oct 2019 07:01:17 -0000 1.162
+++ proprietary.nl.po 31 Oct 2019 12:01:58 -0000 1.163
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -361,6 +361,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -437,14 +450,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.pl-diff.html 28 Oct 2019 07:01:18 -0000 1.167
+++ proprietary.pl-diff.html 31 Oct 2019 12:01:58 -0000 1.168
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2019, the pages in this directory
list around 400
-instances of malicious functionalities (with more than 500 references to
+<p>As of October, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 500
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -131,12 +131,12 @@
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -246,14 +258,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription
can be
- turned into a tool for sabotage.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 07:01:18 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.pl.po 28 Oct 2019 07:01:18 -0000 1.155
+++ proprietary.pl.po 31 Oct 2019 12:01:58 -0000 1.156
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -540,6 +540,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -616,14 +629,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.pot 28 Oct 2019 07:01:18 -0000 1.152
+++ proprietary.pot 31 Oct 2019 12:01:58 -0000 1.153
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,6 +257,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a "
+"href=\"https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\">
"
+"sends browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to "
+"“fraudulent” websites. Since Tencent collaborates with the "
+"Chinese government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a "
"href=\"https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/\">
"
"all application software for MacOS be approved by Apple first</a>."
@@ -332,15 +345,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a "
-"href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order\">
"
-"cancelled the software subscriptions of all users in Venezuela</a>. This "
-"demonstrates how a requirement for subscription can be turned into a tool "
-"for sabotage."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary.pt-br.po 28 Oct 2019 07:01:18 -0000 1.249
+++ proprietary.pt-br.po 31 Oct 2019 12:01:58 -0000 1.250
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-10-25 17:58-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -306,6 +306,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -427,24 +440,6 @@
"software não é uma desculpa para censurar qual software as pessoas podem "
"usar."
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Adobe has <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/"
-#| "executive-order-venezuela.html\"> cancelled the software subscriptions of "
-#| "all users in Venezuela</a>. This demonstrates that a subscription "
-#| "requirement is a potential tool for sabotage."
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"A Adobe <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/"
-"executive-order-venezuela.html\"> cancelou as assinaturas de software de "
-"todos os usuários na Venezuela</a>. Isso demonstra que um requisito da "
-"assinatura é uma ferramenta em potencial para sabotagem."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -519,6 +514,23 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
+#, fuzzy
+#~| msgid ""
+#~| "Adobe has <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/"
+#~| "executive-order-venezuela.html\"> cancelled the software subscriptions "
+#~| "of all users in Venezuela</a>. This demonstrates that a subscription "
+#~| "requirement is a potential tool for sabotage."
+#~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-"
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "A Adobe <a href=\"https://helpx.adobe.com/x-productkb/policy-pricing/"
+#~ "executive-order-venezuela.html\"> cancelou as assinaturas de software de "
+#~ "todos os usuários na Venezuela</a>. Isso demonstra que um requisito da "
+#~ "assinatura é uma ferramenta em potencial para sabotagem."
+
#~ msgid ""
#~ "A very popular app found in the Google Play store contained a module that "
#~ "was designed to <a href=\"https://arstechnica.com/information-"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary.ru.po 29 Oct 2019 16:29:00 -0000 1.320
+++ proprietary.ru.po 31 Oct 2019 12:01:58 -0000 1.321
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-10-31 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,6 +312,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -432,18 +446,6 @@
"ÐодÑинение “меÑÑнÑм законам” о Ñом,
ÑÑо лÑди могÑÑ Ð´ÐµÐ»Ð°ÑÑ Ñ "
"пÑогÑаммами, не извинÑÐµÑ ÑензÑÑÑ
пÑогÑамм, коÑоÑÑми лÑди могÑÑ
полÑзоваÑÑÑÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-"Adobe <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-"
-"users-from-venezuela-due-to-us-executive-order\"> оÑменила вÑÑ
подпиÑÐºÑ "
-"полÑзоваÑелей из ÐенеÑÑÑлÑ</a>. ÐÑо
показÑваеÑ, как ÑÑебование подпиÑки "
-"Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¾Ð±ÑаÑено в оÑÑдие ÑабоÑажа."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -522,6 +524,17 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-"
+#~ "to-ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the "
+#~ "software subscriptions of all users in Venezuela</a>. This demonstrates "
+#~ "how a requirement for subscription can be turned into a tool for sabotage."
+#~ msgstr ""
+#~ "Adobe <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
+#~ "ban-users-from-venezuela-due-to-us-executive-order\"> оÑменила
вÑÑ "
+#~ "подпиÑÐºÑ Ð¿Ð¾Ð»ÑзоваÑелей из ÐенеÑÑÑлÑ</a>.
ÐÑо показÑваеÑ, как ÑÑебование "
+#~ "подпиÑки Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¾Ð±ÑаÑено в оÑÑдие
ÑабоÑажа."
+
+#~ msgid ""
#~ "A very popular app found in the Google Play store contained a module that "
#~ "was designed to <a href=\"https://arstechnica.com/information-"
#~ "technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary.zh-tw-diff.html 28 Oct 2019 07:01:20 -0000 1.129
+++ proprietary.zh-tw-diff.html 31 Oct 2019 12:01:58 -0000 1.130
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -130,9 +130,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -163,10 +163,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -188,6 +188,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -249,14 +261,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription
can be
- turned into a tool for sabotage.</p>
- </li>
</ul></em></ins></span>
@@ -318,7 +322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 07:01:20 $
+$Date: 2019/10/31 12:01:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.zh-tw.po 28 Oct 2019 07:01:20 -0000 1.140
+++ proprietary.zh-tw.po 31 Oct 2019 12:01:58 -0000 1.141
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-28 06:55+0000\n"
+"POT-Creation-Date: 2019-10-31 11:55+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,6 +433,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple plans to require that <a href=\"https://www.macrumors.com/2019/04/08/"
"mac-apps-notarization-macos-10-14-5/\"> all application software for MacOS "
"be approved by Apple first</a>."
@@ -509,14 +522,6 @@
"is no excuse for censoring what software people can use."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
-"ban-users-from-venezuela-due-to-us-executive-order\"> cancelled the software "
-"subscriptions of all users in Venezuela</a>. This demonstrates how a "
-"requirement for subscription can be turned into a tool for sabotage."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- pt-br.po 30 Oct 2019 17:00:15 -0000 1.200
+++ pt-br.po 31 Oct 2019 12:01:58 -0000 1.201
@@ -1371,6 +1371,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- ru.po 31 Oct 2019 03:59:28 -0000 1.335
+++ ru.po 31 Oct 2019 12:01:58 -0000 1.336
@@ -1657,6 +1657,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- zh-tw.po 30 Oct 2019 17:00:15 -0000 1.155
+++ zh-tw.po 31 Oct 2019 12:01:59 -0000 1.156
@@ -1276,6 +1276,19 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Safari occasionally <a href=\"https://blog.cryptographyengineering."
+"com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/\"> sends "
+"browsing data from Apple devices in China to the Tencent Safe Browsing "
+"service</a>, to check URLs that possibly correspond to “"
+"fraudulent” websites. Since Tencent collaborates with the Chinese "
+"government, its Safe Browsing black list most certainly contains the "
+"websites of political opponents. By linking the requests originating from "
+"single IP addresses, the government can identify dissenters in China and "
+"Hong Kong, thus endangering their lives."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Chinese Communist Party's “Study the Great Nation” app "
"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., (continued)
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/16
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/30
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=