www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary workshop/targets.rec workshop/m...


From: Therese Godefroy
Subject: www/proprietary workshop/targets.rec workshop/m...
Date: Sat, 15 Feb 2020 09:25:46 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 20/02/15 09:25:46

Modified files:
        proprietary/workshop: targets.rec mal.rec 
        proprietary    : malware-cars.html malware-games.html 
                         malware-mobiles.html 
                         proprietary-addictions.html 
                         proprietary-deception.html 
                         proprietary-surveillance.html proprietary.html 
                         proprietary-sabotage.html 

Log message:
        Snooping and sabotage by employer's software (www-discuss 2019-12-17);
        Deceptive apps bypassing user's permissions (www-discuss 2020-02-02);
        Surveillance by modern cars (www-discuss 2020-02-02);
        Loot boxes: add a paragraph to the "addictiveness" entry.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/targets.rec?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.100&r2=1.101

Patches:
Index: workshop/targets.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/targets.rec,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- workshop/targets.rec        16 Nov 2019 12:50:43 -0000      1.15
+++ workshop/targets.rec        15 Feb 2020 14:25:45 -0000      1.16
@@ -38,7 +38,7 @@
 Targets: back-doors drm insecurity interference sabotage subscriptions 
surveillance tethers jails tyrants
 
 Page: malware-mobiles.html
-Targets: phone-communications back-doors drm insecurity interference 
manipulation sabotage surveillance jails tyrants
+Targets: phone-communications back-doors deception drm insecurity interference 
manipulation sabotage surveillance jails tyrants
 
 Page: malware-webpages.html
 Targets: malware-webpages

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- workshop/mal.rec    6 Feb 2020 16:03:44 -0000       1.185
+++ workshop/mal.rec    15 Feb 2020 14:25:45 -0000      1.186
@@ -25,6 +25,53 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2020-02-15
+Id: 201912090
+RT: www-discuss 2019-12-17 (iMonsters and Android phones)
+PubDate: 2019-12-09
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: proprietary-sabotage.html proprietary-sabotage
+Target: malware-mobiles.html surveillance
+Keywords:
+Blurb: <p>iMonsters and Android phones,
++   when used for work, give employers powerful <a
++   
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
++   snooping and sabotage capabilities</a> if they install their own
++   software on the device.  Many employers demand to do this.  For the
++   employee, this is simply nonfree software, as fundamentally unjust
++   and as dangerous as any other nonfree software.</p>
+
+Added: 2020-02-15
+Id: 202002020
+RT: www-discuss 2020-02-02 (malware)
+PubDate: 2019-07-10
+Target: proprietary-deception.html proprietary-deception
+Target: malware-mobiles.html deception
+Keywords:
+Blurb: <p>Many Android apps fool their users by asking
++   them to decide what permissions to give the program, and then <a
++   
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
++   bypassing these permissions</a>.</p>
++
++   <p>The Android system is supposed to prevent data leaks by running apps
++   in isolated sandboxes, but developers have found ways to access the
++   data by other means, and there is nothing the user can do to stop
++   them from doing so, since both the system and the apps are nonfree.</p>
+
+Added: 2020-02-15
+Id: 201912171
+RT: www-discuss 2020-02-02 (malware)
+PubDate: 2019-12-17
+Target: proprietary-surveillance.html SpywareInVehicles
+Target: malware-cars.html malware-cars
+Keywords:
+Blurb: <p>Most modern cars now <a
++   href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
++   record and send various kinds of data to the manufacturer</a>. For
++   the user, access to the data is nearly impossible, as it involves
++   cracking the car's computer, which is always hidden and running with
++   proprietary software.</p>
+
 Added: 2020-02-01
 Id: 202001290
 RT:
@@ -1181,6 +1228,7 @@
 Id: 209900000
 RT: www-discuss 2019-11-13 (Game addictiveness, new version)
 PubDate: 2010-03-08
+PubDate: 2017-09-28
 PubDate: 2015-01-00
 Target: proprietary-addictions.html addictiveness
 Target: malware-games.html malware-games
@@ -1222,6 +1270,12 @@
 +   <p>Games such as World of Warcraft, which are considered very addictive,
 +   use several of these techniques.</p>
 +
++   <p style="margin-top: 1em">&ldquo;Loot boxes&ldquo; are a direct
++   application of the random reward mechanism, and their addictiveness
++   is enhanced by seductive animation. They are <a
++   
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
++   akin to gambling</a>.</p>
++
 +   <p style="margin-top: 1em">The developers of gratis
 +   mobile games apply the techniques described above to <a
 +   href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
@@ -1232,8 +1286,8 @@
 +   willing to spend. Thus developers carefully study the behavior of
 +   millions of users to increase the addictiveness of their games.</p>
 +
-+   <p><small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
-+   &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
++   <p><small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to
++   mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
 +   instead.)</small></p>
 +
 +   <p style="margin-top: 1em">However, the addictiveness of a game is

Index: malware-cars.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-cars.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-cars.html   18 Nov 2019 10:27:57 -0000      1.30
+++ malware-cars.html   15 Feb 2020 14:25:46 -0000      1.31
@@ -51,6 +51,15 @@
 <div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
+  <li id="M201912171">
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
+  </li>
+
   <li id="M201909160">
     <p>Tesla users claim Tesla <a
     
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>force-installed
@@ -342,7 +351,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-games.html  18 Nov 2019 10:27:57 -0000      1.45
+++ malware-games.html  15 Feb 2020 14:25:46 -0000      1.46
@@ -89,6 +89,12 @@
     <p>Games such as World of Warcraft, which are considered very addictive,
     use several of these techniques.</p>
 
+    <p style="margin-top: 1em">&ldquo;Loot boxes&ldquo; are a direct
+    application of the random reward mechanism, and their addictiveness
+    is enhanced by seductive animation. They are <a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
+    akin to gambling</a>.</p>
+
     <p style="margin-top: 1em">The developers of gratis
     mobile games apply the techniques described above to <a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
@@ -99,8 +105,8 @@
     willing to spend. Thus developers carefully study the behavior of
     millions of users to increase the addictiveness of their games.</p>
 
-    <p><small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    <p><small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)</small></p>
 
     <p style="margin-top: 1em">However, the addictiveness of a game is
@@ -404,7 +410,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- malware-mobiles.html        20 Jan 2020 18:33:28 -0000      1.117
+++ malware-mobiles.html        15 Feb 2020 14:25:46 -0000      1.118
@@ -114,6 +114,7 @@
 <ul>
   <li><a href="#back-doors">Back doors</a></li>
 <!--<li><a href="#censorship">Censorship</a></li>-->
+  <li><a href="#deception">Deception</a></li>
   <li><a href="#drm">DRM</a></li>
   <li><a href="#insecurity">Insecurity</a></li>
   <li><a href="#interference">Interference</a></li>
@@ -203,6 +204,23 @@
 </ul>
 
 
+<h3 id="deception">deception</h3>
+
+<ul class="blurbs">
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+</ul>
+
+
 <h3 id="drm">DRM</h3>
 
 <p>Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
@@ -444,6 +462,16 @@
     full-time listening devices</a>.</p>
   </li>
 
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M201909091">
     <p>The Facebook app <a
     
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
@@ -1186,7 +1214,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/01/20 18:33:28 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-addictions.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-addictions.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-addictions.html 18 Nov 2019 10:27:57 -0000      1.21
+++ proprietary-addictions.html 15 Feb 2020 14:25:46 -0000      1.22
@@ -99,6 +99,12 @@
     <p>Games such as World of Warcraft, which are considered very addictive,
     use several of these techniques.</p>
 
+    <p style="margin-top: 1em">&ldquo;Loot boxes&ldquo; are a direct
+    application of the random reward mechanism, and their addictiveness
+    is enhanced by seductive animation. They are <a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
+    akin to gambling</a>.</p>
+
     <p style="margin-top: 1em">The developers of gratis
     mobile games apply the techniques described above to <a
     href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
@@ -109,8 +115,8 @@
     willing to spend. Thus developers carefully study the behavior of
     millions of users to increase the addictiveness of their games.</p>
 
-    <p><small>(Unfortunately, this article uses &ldquo;free&rdquo; to mean
-    &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    <p><small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
     instead.)</small></p>
 
     <p style="margin-top: 1em">However, the addictiveness of a game is
@@ -326,7 +332,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-deception.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-deception.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-deception.html  23 Nov 2019 14:58:54 -0000      1.43
+++ proprietary-deception.html  15 Feb 2020 14:25:46 -0000      1.44
@@ -60,6 +60,18 @@
 <div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
   <li id="M201904150">
     <p id="M201509210">Volkswagen programmed its car engine computers to <a
     
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
@@ -190,7 +202,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/23 14:58:54 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- proprietary-surveillance.html       1 Feb 2020 14:25:41 -0000       1.310
+++ proprietary-surveillance.html       15 Feb 2020 14:25:46 -0000      1.311
@@ -822,6 +822,16 @@
     surveillance for other companies as well as for Amazon</a>.</p>
   </li>
 
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M201910130">
     <p>The Chinese Communist Party's &ldquo;Study
     the Great Nation&rdquo; app requires users to grant it <a
@@ -2093,6 +2103,15 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201912171">
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
+  </li>
+
   <li id="M201903290">
     <p>Tesla cars collect lots of personal data, and <a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html";>
@@ -2542,7 +2561,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/01 14:25:41 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary.html    1 Feb 2020 14:19:02 -0000       1.200
+++ proprietary.html    15 Feb 2020 14:25:46 -0000      1.201
@@ -173,6 +173,37 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202002020">
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
+  <li id="M201912171">
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
+  </li>
+
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M202001290">
     <p>The Amazon Ring app does <a
     
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>
@@ -195,79 +226,6 @@
     a secret secondary malicious purpose. All this is in addition to the
     malware of Android itself.</p>
   </li>
-
-  <li id="M201912170">
-    <p>Some security breakers (wrongly referred in this article as <a
-    
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker";>&ldquo;hackers&rdquo;</a>)
-    managed to interfere the Amazon Ring proprietary system, and <a
-    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
-    its camera, speakers and microphones</a>.</p>
-  </li>
-
-  <li id="M201803210">
-    <p>Some <span>social networking</span> apps are <a
-    href="https://www.jeffbullas.com/facebook-creates-addiction/";>
-    designed to get users addicted</a>. These try to merge into your daily
-    routine by exploiting social pressure and your natural desire for
-    socialization, converting habitual gestures into thorough addiction. As
-    already noted for games, addictiveness is essentially based on random
-    rewards. In the present case, the rewards are messages from friends
-    and followers, &ldquo;likes,&rdquo; news, interesting videos, etc. The
-    software is designed to trigger users' desire for these rewards,
-    and keep this desire alive as long as possible.</p>
-
-    <ul>
-      <li>By default, notifications are sent every time a new item comes
-      in, instead of, say, once a day. They are associated with sounds or
-      vibrations which make them even more compelling. (Remember Pavlov's
-      experiments with rats.) These triggers are often opt-out, and many
-      users don't try to turn them off. They are most effective when the
-      app is installed on a mobile device which is always on and never
-      leaves the user. As a side effect, they may contribute to the <a
-      
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>
-      addictiveness of &ldquo;smart&rdquo; phones</a>.</li>
-
-      <li>Users are served selected material
-      that is likely to interest   them, based on <a
-      
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>
-      profiling</a>. (This paves the way to <a
-      href="/proprietary/proprietary-manipulation.html">manipulation</a>,
-      by the way.)</li>
-
-      <li>The app interface is designed to make   users
-      stay on the site as long as possible, using <a
-      
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>
-      infinite scrolling</a> for example.</li>
-
-      <li>The company that owns the social network tries
-      to cover   users' needs as extensively as possible, by <a
-      
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
-      acquiring other companies</a> if needed. Once users
-      have concentrated   most of their online activities and
-      a lot of their personal data on   a single platform (or
-      a set of platforms that belong to the same   group), they find it <a
-      
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>
-      almost impossible to leave</a>. And even if they wanted to, they
-      would have a hard time digging out the relevant options, and the
-      app would aggressively nag them to stay.</li>
-    </ul>
-
-    <p>A good way to minimize the risk of addiction, short of avoiding
-    social media altogether, is to turn off notifications and leave as
-    little as possible of your own data on the platform.</p>
-  </li>
-
-  <li id="M201910131">
-    <p>Safari occasionally <a
-    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
-    sends browsing data from Apple devices in China to the Tencent Safe
-    Browsing service</a>, to check URLs that possibly correspond to
-    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
-    with the Chinese government, its Safe Browsing black list most certainly
-    contains the websites of political opponents. By linking the requests
-    originating from single IP addresses, the government can identify
-    dissenters in China and Hong Kong, thus endangering their lives.</p>
-  </li>
 </ul>
 
 </div>
@@ -329,7 +287,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2020/02/01 14:19:02 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary-sabotage.html   18 Nov 2019 10:27:57 -0000      1.100
+++ proprietary-sabotage.html   15 Feb 2020 14:25:46 -0000      1.101
@@ -56,6 +56,16 @@
 <div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
+  <li id="M201912090">
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
   <li id="M201910071">
     <p>Adobe has <a
     
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
@@ -653,7 +663,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/11/18 10:27:57 $
+$Date: 2020/02/15 14:25:46 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]