[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 26 Jun 2020 19:31:15 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/06/26 19:31:14
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.508&r2=1.509
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.604&r2=1.605
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.325&r2=1.326
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.359&r2=1.360
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.414&r2=1.415
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.187&r2=1.188
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- de.po 25 Jun 2020 23:01:25 -0000 1.187
+++ de.po 26 Jun 2020 23:31:12 -0000 1.188
@@ -8259,6 +8259,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- es.po 26 Jun 2020 00:29:34 -0000 1.270
+++ es.po 26 Jun 2020 23:31:12 -0000 1.271
@@ -7786,6 +7786,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- fr.po 26 Jun 2020 14:57:13 -0000 1.328
+++ fr.po 26 Jun 2020 23:31:12 -0000 1.329
@@ -6953,6 +6953,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- it.po 25 Jun 2020 23:01:25 -0000 1.187
+++ it.po 26 Jun 2020 23:31:13 -0000 1.188
@@ -7808,6 +7808,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- ja.po 25 Jun 2020 23:01:25 -0000 1.195
+++ ja.po 26 Jun 2020 23:31:13 -0000 1.196
@@ -5987,6 +5987,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-mobiles.de-diff.html 24 Jun 2020 05:37:10 -0000 1.79
+++ malware-mobiles.de-diff.html 26 Jun 2020 23:31:13 -0000 1.80
@@ -331,51 +331,48 @@
all
<span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have
a</em></ins></span> <a <span
class="removed"><del><strong>href="#universal-back-door">
lots of bugs</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">
- universal back door</em></ins></span> in the <span
class="removed"><del><strong>phones' radio software</a>.</p>
+ universal back door</em></ins></span> in the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
+ to introduce another? Because this one is controlled by Coolpad.</p>
</li>
-</ul>
-<h3 id="surveillance">Mobile Surveillance</h3>
-<ul>
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that</strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
- to introduce another? Because</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>one is controlled by
Coolpad.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120.1">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>spyware sending
lots of data</strong></del></span>
- <span class="inserted"><ins><em>a back door</a> that provides remote
access</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>files
stored</em></ins></span> on
- <span class="inserted"><ins><em>the device.</p>
+ Samsung Galaxy devices running proprietary Android versions come with
+ a back door</a> that provides remote access to the files stored on
+ the device.</p></em></ins></span>
</li>
</ul>
-<h3 id="deception">Deception</h3>
+<h3 <span class="removed"><del><strong>id="surveillance">Mobile
Surveillance</h3>
+<ul>
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span> <span
class="inserted"><ins><em>id="deception">Deception</h3>
<ul class="blurbs">
<li id="M202002020">
<p>Many Android apps fool their users by asking
- them to decide</em></ins></span> what <span
class="removed"><del><strong>people are listening</strong></del></span> <span
class="inserted"><ins><em>permissions</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ them</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>decide
what permissions</em></ins></span> to <span class="removed"><del><strong>zero
price.</p>
+ </li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>give the program, and then</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
bypassing these permissions</a>.</p>
- <p>The Android system is supposed</em></ins></span> to <span
class="removed"><del><strong>serve</strong></del></span> <span
class="inserted"><ins><em>prevent data leaks by running apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to
stop</em></ins></span>
- them <span class="inserted"><ins><em>from doing so, since both the system
and the apps are nonfree.</p>
+ <p>The Android system is supposed to prevent</em></ins></span> data
<span class="inserted"><ins><em>leaks by running apps
+ in isolated sandboxes, but developers have found ways</em></ins></span> to
<span class="removed"><del><strong>China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people</strong></del></span>
+ <span class="inserted"><ins><em>data by other means, and there is nothing
the user can do to stop
+ them from doing so, since both the system and the apps</em></ins></span>
are <span class="removed"><del><strong>listening</strong></del></span> <span
class="inserted"><ins><em>nonfree.</p>
</li>
</ul>
@@ -383,8 +380,7 @@
<h3 id="drm">DRM</h3>
<p>Digital restrictions management, or “DRM,” refers to
-functionalities designed to restrict what users can do</em></ins></span> with
<span class="removed"><del><strong>targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>the data
+functionalities designed to restrict what users can do with the data
in their computers.</p>
<ul class="blurbs">
@@ -410,8 +406,8 @@
<p>Out of 21 gratis Android antivirus apps
that were tested by security researchers, eight <a
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed to detect a test virus</a>. All of them asked for dangerous
- permissions or contained advertising trackers, with seven being more
+ failed</em></ins></span> to <span class="inserted"><ins><em>detect a test
virus</a>. All of them asked for dangerous
+ permissions</em></ins></span> or <span
class="removed"><del><strong>watching</a>. In addition, it
may</strong></del></span> <span class="inserted"><ins><em>contained advertising
trackers, with seven being more
risky than the average of the 100 most popular Android apps.</p>
<p><small>(Note that the article refers to these proprietary
apps as
@@ -420,7 +416,7 @@
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control systems
can</em></ins></span> be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -429,7 +425,7 @@
<li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in the owner's contact list</a>.</p>
+ photos</em></ins></span> to <span
class="removed"><del><strong>serve</strong></del></span> <span
class="inserted"><ins><em>people in the owner's contact
list</a>.</p>
</li>
<li id="M201704050">
@@ -443,7 +439,8 @@
<p>The CIA exploited existing vulnerabilities
in “smart” TVs and phones to design a malware that <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
+ spies through their microphones and cameras while making</em></ins></span>
them <span class="removed"><del><strong>with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>appear
to be turned off</a>. Since the spyware sniffs signals, it bypasses
encryption.</p>
</li>
@@ -631,6 +628,19 @@
full-time listening devices</a>.</p>
</li>
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202004300">
<p>Xiaomi phones <a
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
@@ -1126,7 +1136,7 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
<span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
- the non-premium version <span class="removed"><del><strong>of the app
does
+ the non-premium version of the <span class="removed"><del><strong>app
does
JavaScript injection for tracking and display ads.</dd>
</dl>
</li>
@@ -1177,7 +1187,7 @@
of hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>of</em></ins></span>
the <span class="removed"><del><strong>first
+and other companies from getting this personal information in the first
place!</p></strong></del></span> <span class="inserted"><ins><em>app
does JavaScript injection for
tracking the user and displaying ads.</dd>
</dl></em></ins></span>
@@ -1316,7 +1326,8 @@
<li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"></strong></del></span>
+ based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are
starting
to realize that it is nasty.</p>
@@ -1343,7 +1354,7 @@
<li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a></em></ins></span> found <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>that 90% of</em></ins></span> the <span
class="removed"><del><strong>500 most popular</strong></del></span> <span
class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
+ study</em></ins></span> in <span class="inserted"><ins><em>2015</a>
found that 90% of</em></ins></span> the <span class="removed"><del><strong>500
most popular</strong></del></span> <span
class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
Android <span
class="removed"><del><strong>apps</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps contained recognizable tracking libraries.
For the paid
proprietary apps, it was only 60%.</p></em></ins></span>
@@ -1603,7 +1614,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-mobiles.de.po 24 Jun 2020 05:37:10 -0000 1.135
+++ malware-mobiles.de.po 26 Jun 2020 23:31:13 -0000 1.136
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1036,6 +1036,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- malware-mobiles.es.po 24 Jun 2020 05:37:10 -0000 1.178
+++ malware-mobiles.es.po 26 Jun 2020 23:31:13 -0000 1.179
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -876,6 +877,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- malware-mobiles.fr.po 24 Jun 2020 05:37:10 -0000 1.197
+++ malware-mobiles.fr.po 26 Jun 2020 23:31:13 -0000 1.198
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-05-03 11:25+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -872,6 +873,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-mobiles.it-diff.html 24 Jun 2020 05:37:10 -0000 1.84
+++ malware-mobiles.it-diff.html 26 Jun 2020 23:31:13 -0000 1.85
@@ -120,27 +120,28 @@
<ul>
<li>
<p>The universal back door</strong></del></span> <span
class="inserted"><ins><em>Apple or Google (including its subsidiaries).
-Malicious functionalities</em></ins></span> in <span
class="removed"><del><strong>portable phones</strong></del></span> <span
class="inserted"><ins><em>mobile software released by Apple or
-Google are listed in dedicated pages,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed</strong></del></span>
+Malicious functionalities</em></ins></span> in <span
class="removed"><del><strong>portable phones
+ <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ is employed to listen through their microphones</a>.</p>
+ <p>Most</strong></del></span> mobile <span
class="removed"><del><strong>phones have this universal back door, which has
been
+ used to</strong></del></span> <span class="inserted"><ins><em>software
released by Apple or
+Google are listed in dedicated pages,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ turn them malicious</a>.</p>
+ <p>More about</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple's
Operating Systems are
-Malware</a> and <a href="/proprietary/malware-google.html">Google's
+Malware</a> and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google's
Software Is Malware</a> respectively.</p>
</div>
<div class="important">
-<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>listen through their
microphones</a>.</p>
- <p>Most mobile phones have</strong></del></span> <span
class="inserted"><ins><em>be in</em></ins></span> this <span
class="removed"><del><strong>universal back door, which has been
- used</strong></del></span> <span class="inserted"><ins><em>page but isn't
-here, please write</em></ins></span>
-to <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span
class="inserted"><ins><em>href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL</em></ins></span> of <span
class="removed"><del><strong>this problem</a>.</p>
+<p>If you know</em></ins></span> of <span class="inserted"><ins><em>an
example that ought to be in</em></ins></span> this <span
class="removed"><del><strong>problem</a>.</p>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> a
+ Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> <span class="inserted"><ins><em>page but isn't
+here, please write
+to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
+to inform us. Please include the URL of</em></ins></span> a
<span class="removed"><del><strong>back door</a> that provides remote
access</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
to <span class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
@@ -222,20 +223,19 @@
<ul>
<li>
- <p>Siri, Alexa, and all</strong></del></span> the <span
class="removed"><del><strong>other voice-control systems can
be</strong></del></span>
- <span class="inserted"><ins><em>back door, but at least it is unable to
turn the phone unto a
+ <p>Siri, Alexa, and all</strong></del></span> <span
class="inserted"><ins><em>the
+ back door, but at least it is unable to turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used to make
phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ <p>The universal back door is apparently also used to make phones
<a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
are tracked, and may also make the listening feature work.</p>
</li>
</ul>
<div id="TOC">
-<h3>Types of malware</em></ins></span> in <span
class="removed"><del><strong>ultrasound that humans can't hear</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>mobiles</h3>
+<h3>Types of malware in mobiles</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
@@ -257,13 +257,10 @@
<li id="M209900001">
<p>See above for the <a
href="#universal-back-door-phone-modem">general universal back
door</a> in essentially all mobile phones, which permits converting
- them into full-time listening devices.</p></em></ins></span>
+ them into full-time listening devices.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202001090">
+ <li id="M202001090">
<p>Android phones subsidized by the US government come with <a
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
preinstalled adware and a back door for forcing installation of
@@ -277,34 +274,30 @@
<p>In other words, a program whose raison d'être is malicious has
a secret secondary malicious purpose. All this is in addition to the
- malware of</em></ins></span> Android <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>itself.</p>
+ malware of Android itself.</p>
</li>
<li id="M201908270">
<p>A very popular app found in the
- Google Play store contained a module that was designed
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
+ Google Play store contained a module that was designed to <a
+
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on the user's computer</a>. The app developers
regularly used it to make the computer download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
- run nonfree apps. They</em></ins></span> can <span
class="inserted"><ins><em>never</em></ins></span> be <span
class="removed"><del><strong>hijacked through their Wi-Fi chips</a>
because of</strong></del></span> <span class="inserted"><ins><em>completely
sure that</em></ins></span> a <span class="removed"><del><strong>bug in
- Broadcom's non-free firmware.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree
- app is safe.</p></em></ins></span>
+ run nonfree apps. They can never be completely sure that a nonfree
+ app is safe.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609130">
- <p>Xiaomi</em></ins></span> phones <span
class="inserted"><ins><em>come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"></em></ins></span>
- a <span class="removed"><del><strong>security hole</strong></del></span>
<span class="inserted"><ins><em>universal back door in the application
processor, for Xiaomi's
+ <li id="M201609130">
+ <p>Xiaomi phones come with <a
+
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">
+ a universal back door in the application processor, for Xiaomi's
use</a>.</p>
<p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>the local phone
+ universal back door in the modem processor that the local phone
company can use</a>.</p>
</li>
@@ -603,6 +596,19 @@
full-time listening devices</a>.</p>
</li>
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202004300">
<p>Xiaomi phones <a
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
@@ -952,7 +958,7 @@
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
+ <p>On</em></ins></span> the other <span
class="removed"><del><strong>voice-control systems</strong></del></span> <span
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
@@ -970,41 +976,51 @@
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ public, so we</em></ins></span> can <span
class="removed"><del><strong>be</strong></del></span> <span
class="inserted"><ins><em>depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>play
commands in ultrasound</strong></del></span> <span
class="inserted"><ins><em>they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
+ <p>With proprietary apps, one can only hope</em></ins></span> that
<span class="removed"><del><strong>humans can't hear</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
</li>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+<span class="removed"><del><strong><li>
+ <p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040">
+ <p>A study found 234</em></ins></span> Android <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>apps that track users by</em></ins></span> <a
<span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+ can be hijacked through their Wi-Fi chips</a>
because</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
+ <p>Faceapp appears to do lots</em></ins></span> of <span
class="removed"><del><strong>a bug</strong></del></span> <span
class="inserted"><ins><em>surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands to personal data</em></ins></span> in
+ <span class="removed"><del><strong>Broadcom's non-free
firmware.</p></strong></del></span> <span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
</li>
- <li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
+<span class="removed"><del><strong><li>
+<p>Samsung
+phones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing</em></ins></span> a <span
class="removed"><del><strong>security hole</strong></del></span> <span
class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>install
@@ -1132,8 +1148,8 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
- <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app <span class="removed"><del><strong>have
- confirmed that the non-premium version of the app does
+ <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have
+ <span class="removed"><del><strong>confirmed that the non-premium
version of the app does
JavaScript injection for tracking and display ads.</dd>
</dl>
</li>
@@ -1184,7 +1200,7 @@
of hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>have confirmed
that</em></ins></span>
+and other companies from getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>confirmed
that</em></ins></span>
the <span class="removed"><del><strong>first
place!</p></strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection for
tracking the user and displaying ads.</dd>
@@ -1314,8 +1330,8 @@
<p>According to Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen</em></ins></span> to the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>microphone,
+ them</em></ins></span> to <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen to the microphone,
retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
read the contact list. This malware is designed to disguise itself
@@ -1324,8 +1340,7 @@
<li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span>
+ based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are
starting
to realize that it is nasty.</p>
@@ -1352,7 +1367,7 @@
<li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study</em></ins></span> in <span class="inserted"><ins><em>2015</a>
found that 90% of</em></ins></span> the <span class="removed"><del><strong>500
most popular</strong></del></span> <span
class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
+ study in 2015</a></em></ins></span> found <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>that 90% of</em></ins></span> the <span
class="removed"><del><strong>500 most popular</strong></del></span> <span
class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
Android <span
class="removed"><del><strong>apps</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps contained recognizable tracking libraries.
For the paid
proprietary apps, it was only 60%.</p></em></ins></span>
@@ -1612,7 +1627,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-mobiles.it.po 24 Jun 2020 05:37:10 -0000 1.135
+++ malware-mobiles.it.po 26 Jun 2020 23:31:13 -0000 1.136
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -994,6 +994,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-mobiles.ja-diff.html 24 Jun 2020 05:37:10 -0000 1.101
+++ malware-mobiles.ja-diff.html 26 Jun 2020 23:31:13 -0000 1.102
@@ -138,21 +138,21 @@
<li><p>Most mobile phones have</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include the URL
of</em></ins></span> a <span class="removed"><del><strong>universal back door,
which has been
used</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.</p>
+to <span class="removed"><del><strong><a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ turn them malicious</a>.</p>
+ </li>
+
+ <li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+ Samsung Galaxy devices running proprietary Android versions
come</strong></del></span> <span class="inserted"><ins><em>serve as specific
substantiation.</p>
</div>
<div class="column-limit" id="phone-communications"></div>
<ul class="blurbs">
<li id="M201502100">
- <p>The phone network</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- </li>
-
- <li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions
come</strong></del></span>
- <span
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ <p>The phone network <a
+ href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
<p>This is inherent in the design of the phone network: as long as
@@ -207,8 +207,8 @@
<span class="inserted"><ins><em>has the power</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
<span class="inserted"><ins><em>rewrite the software for the main processor
too.</p>
- <p>A few phone models are specially designed so that the modem
- processor does not control</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>microphone,</em></ins></span> and <span
class="removed"><del><strong>you should</strong></del></span> <span
class="inserted"><ins><em>so that it can't
+ <p>A few phone models are specially designed so
that</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>modem
+ processor does not control the microphone,</em></ins></span> and <span
class="removed"><del><strong>you should</strong></del></span> <span
class="inserted"><ins><em>so that it can't
change the software in the main processor. They still</em></ins></span>
have the <span class="removed"><del><strong>right</strong></del></span>
<span class="inserted"><ins><em>back door, but at least it is
unable</em></ins></span> to
<span class="removed"><del><strong>decide who (if
anyone)</strong></del></span> <span class="inserted"><ins><em>turn the phone
unto a
@@ -227,12 +227,12 @@
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"></em></ins></span>
transmit <span class="removed"><del><strong>personal data in an insecure
way</a>.
However,</strong></del></span> <span class="inserted"><ins><em>even when they
are turned off</a>. This means their movements
- are tracked, and may also make</em></ins></span> the <span
class="removed"><del><strong>worse aspect</strong></del></span> <span
class="inserted"><ins><em>listening feature work.</p>
+ are tracked, and may also make</em></ins></span> the <span
class="removed"><del><strong>worse aspect of these</strong></del></span> <span
class="inserted"><ins><em>listening feature work.</p>
</li>
</ul>
<div id="TOC">
-<h3>Types</em></ins></span> of <span
class="removed"><del><strong>these</strong></del></span> <span
class="inserted"><ins><em>malware in mobiles</h3>
+<h3>Types of malware in mobiles</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
@@ -593,6 +593,19 @@
full-time listening devices</a>.</p>
</li>
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202004300">
<p>Xiaomi phones <a
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
@@ -1150,13 +1163,13 @@
<p>Apps</em></ins></span> that include <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"></em></ins></span>
Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users <span
class="removed"><del><strong>post on various sites such as
+ are playing nearby</a>. Also on what users post <span
class="removed"><del><strong>on various sites such as
Facebook, Google+ and Twitter.</p>
</li>
<li><p>More than 73% and 47% of mobile applications, both from
Android and iOS
respectively <a href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>post on
various sites
+ behavioral</strong></del></span> <span class="inserted"><ins><em>on various
sites
such as Facebook, Google+</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>Twitter.</p>
</li>
@@ -1460,7 +1473,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- malware-mobiles.ja.po 24 Jun 2020 05:37:10 -0000 1.126
+++ malware-mobiles.ja.po 26 Jun 2020 23:31:13 -0000 1.127
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -754,6 +754,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-mobiles.pot 24 Jun 2020 05:37:10 -0000 1.101
+++ malware-mobiles.pot 26 Jun 2020 23:31:13 -0000 1.102
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -601,6 +601,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
"
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a "
"href=\"https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report
"
"many actions the user takes</a>: starting an app, looking at a folder, "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- malware-mobiles.ru.po 24 Jun 2020 05:37:10 -0000 1.236
+++ malware-mobiles.ru.po 26 Jun 2020 23:31:13 -0000 1.237
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -863,6 +864,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- nl.po 25 Jun 2020 23:01:26 -0000 1.188
+++ nl.po 26 Jun 2020 23:31:13 -0000 1.189
@@ -5401,6 +5401,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- pl.po 25 Jun 2020 23:01:26 -0000 1.187
+++ pl.po 26 Jun 2020 23:31:13 -0000 1.188
@@ -4861,6 +4861,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- pot 25 Jun 2020 23:01:26 -0000 1.186
+++ pot 26 Jun 2020 23:31:13 -0000 1.187
@@ -4589,6 +4589,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary-surveillance.de-diff.html 25 Jun 2020 23:01:26 -0000
1.114
+++ proprietary-surveillance.de-diff.html 26 Jun 2020 23:31:13 -0000
1.115
@@ -556,51 +556,34 @@
<div class="big-subsection">
<span class="inserted"><ins><em><span
id="SpywareAtLowLevel"></span></em></ins></span>
- <h4 <span class="removed"><del><strong>id="SpywareInAndroid">Spyware
in Android</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInBIOS">BIOS</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInAndroid">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInBIOS">BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li>
- <p>20 dishonest Android apps
- recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201509220">
<p><a
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
- Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
- snoopers</a>.</p>
-
- <p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
- BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
+ Lenovo stealthily installed crapware and spyware via
+ BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
- being nonfree. It also distributes</strong></del></span> its
- own <span class="removed"><del><strong>nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span
class="removed"><del><strong>Android</h4></strong></del></span> <span
class="inserted"><ins><em>its
+ own malware</a>.</p>
</li>
</ul>
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+ <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
+
+<span class="removed"><del><strong><ul>
+<li>
+ <p>20 dishonest Android</strong></del></span>
+<span class="inserted"><ins><em><div style="clear: left;"></div>
<div class="big-subsection">
<h4 id="SpywareInTelephones">All “Smart” Phones</h4>
@@ -608,43 +591,46 @@
</div>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most</em></ins></span> apps
+ <span class="removed"><del><strong>recorded</strong></del></span> <span
class="inserted"><ins><em>are malware, but
+ Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on</em></ins></span> them <span
class="removed"><del><strong>and text messages and emails to
+ snoopers</a>.</p>
+
+ <p>Google did</strong></del></span> <span
class="inserted"><ins><em>itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does</em></ins></span> not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
- cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
- users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
- <span class="removed"><del><strong>do.</p>
-
- <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>source code for these apps, and
study the
- source code somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
+ the <span class="removed"><del><strong>contrary, it
+ worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+ them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p>
-</li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span>
- <span class="inserted"><ins><em>read</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
+ text messages, read call, location</em></ins></span> and
+ <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
+ read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
from investigation.</p>
</li>
@@ -652,43 +638,34 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
- VPN apps.”</p>
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>injustice of their
+ being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
- the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
- detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ lots</em></ins></span> of <span class="removed"><del><strong>preventing
apps from
+ cheating? There is no systematic way for Google, or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
- <dt>sFly Network Booster</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code></strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
+ <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong>source code for these apps,</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong><code>SEND_SMS</code>
- permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>users cannot stop
- them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>has full access to
- users' text messages.</dd>
-
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>read logs
- for other apps and also core system logs. TigerVPN
developers</strong></del></span> have <span
class="removed"><del><strong>confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em>GPS.)</p>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>study the
+ source code somehow to determine whether they
mistreat</strong></del></span> users <span class="removed"><del><strong>in
+ various ways. If it did a good job of this,</strong></del></span> <span
class="inserted"><ins><em>cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>could more or less
+ prevent such snooping, except when the app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones
+ to have GPS.)</p>
</li>
</ul>
@@ -702,302 +679,246 @@
<li id="M201910131">
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to the
<span class="removed"><del><strong>UK government if
- requested.</dd>
+ sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> the <span
class="removed"><del><strong>checking.</p>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>the
- users. The stated purpose of the JS injection is</strong></del></span>
<span class="inserted"><ins><em>check URLs that possibly
correspond</em></ins></span> to <span class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span>
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>check URLs that
possibly correspond</em></ins></span> to
<span class="inserted"><ins><em>“fraudulent” websites. Since
Tencent collaborates
with</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p>
+</li>
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
+ contains</em></ins></span> the <span class="removed"><del><strong>privacy
and security
+ of 283 Android VPN apps concluded that “in
spite</strong></del></span> <span
class="inserted"><ins><em>websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
+ <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span
class="inserted"><ins><em>requests
+ originating from single IP addresses,</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject
+ to poor security guarantees</strong></del></span> <span
class="inserted"><ins><em>government can identify
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>abusive practices inflicted by
+ VPN apps.”</p>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that</strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
- contains</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
- JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
- originating from single IP addresses, the government can identify
- dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
+ <p>Following is a non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>Hong Kong, thus endangering their lives.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905280">
- <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
- proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
- privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
+ <li id="M201905280">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>proprietary VPN</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>from
+ the research paper</strong></del></span> <span
class="inserted"><ins><em>contain trackers</em></ins></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third
parties</a>.</p></em></ins></span>
+ sending users' personal information to third parties</a>.</p>
- <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
+ <p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
- trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
- but most</strong></del></span> <span class="inserted"><ins><em>phone
+ Channel (owned by IBM), the crime-alert service Citizen,
Yelp</em></ins></span>
+ and <span class="removed"><del><strong>infringes the
privacy</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it
is likely that most nonfree apps contain
+ trackers. Some</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries</strong></del></span> <span
class="inserted"><ins><em>these send personally identifying
data</em></ins></span> such as <span class="removed"><del><strong>NativeX and
Appflood,
+ meant to track users and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
- is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
- perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
- used for.</p></em></ins></span>
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
+ is collected by the company, there is no telling what</em></ins></span> it
<span class="removed"><del><strong>has full access to
+ users' text messages.</dd>
+
+ <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>will be
+ used for.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
+ <li id="M201711250">
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
- this would require circumventing the iOS DRM.</p></em></ins></span>
- </li>
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
+ requested.</dd>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into</strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <li id="M201709210">
+ <p>In</em></ins></span> the <span class="removed"><del><strong>HTML
pages returned to</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
+ “turning off” WiFi and Bluetooth</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated purpose of the JS
injection is</strong></del></span> <span class="inserted"><ins><em>obvious way
<a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps can collude</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702150">
+ <li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>transmit users' personal
- data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
- no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>without having your fingerprints taken. Users would
have
+ no way to tell whether</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
- them from there.</p></em></ins></span>
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not enough
-to legitimize actions like this. At this point, most users have
-stopped reading</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ <li id="M201609280">
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>have
+ confirmed</strong></del></span> <span class="inserted"><ins><em>on
iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</em></ins></span> that the <span
class="removed"><del><strong>non-premium version of</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span>
+ <span class="inserted"><ins><em>server records these
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and
display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>at least
30 days.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span>
- <li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
- and <span class="removed"><del><strong>Conditions” that spell out
-what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>make.</p>
-
- <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>other companies
from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>paid proprietary
apps, it was only 60%.</p>
- <p>Even if</strong></del></span> <span
class="inserted"><ins><em>video</em></ins></span> you <span
class="removed"><del><strong>disable Google Maps</strong></del></span>
- <span class="inserted"><ins><em>take,</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
- make are automatically updated everywhere. […]
</p></blockquote>
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of</strong></del></span> <span class="inserted"><ins><em>photos
+ and videos they make.</p>
+
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up
to date on all your devices. Any edits you
+ make</em></ins></span> are <span class="removed"><del><strong>not in
fact</strong></del></span> <span class="inserted"><ins><em>automatically
updated everywhere. […] </p></blockquote>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
- startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ <p>(From</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
- unthinkable with free software.</p>
+ <p>There</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
- </li>
+<li>
+ <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>a way to</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
- <li><p>More than 73%</strong></del></span>
- <span class="inserted"><ins><em>surveillance functionality.</p>
+<li>
+ <p>A study found 234 Android apps that track
users</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104">
deactivate
+ iCloud</a>, but it's active</em></ins></span> by <span
class="inserted"><ins><em>default so it still counts as a
+ surveillance functionality.</p>
- <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
+ <p>Unknown people apparently took advantage of this
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>break Apple's
- security</em></ins></span> to <span class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>get at them, but NSA can access any of them through
<a
+ nude photos of many celebrities</a>. They needed</em></ins></span>
to <span class="removed"><del><strong>ultrasound</strong></del></span> <span
class="inserted"><ins><em>break Apple's
+ security to get at them, but NSA can access any of them through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers</strong></del></span>
<span class="inserted"><ins><em>state</a>.</p>
+ remotely extract some data</em></ins></span> from <span
class="removed"><del><strong>beacons placed in stores or played by TV
programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>iPhones for the state</a>.</p>
- <p>This may</em></ins></span> have <span
class="removed"><del><strong>no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just</strong></del></span> <span class="inserted"><ins><em>improved with
<a
+ <p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</em></ins></span> as <span
class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>much</em></ins></span> as <span
class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span class="inserted"><ins><em>Apple
claims</a>.</p></em></ins></span>
+ not as much as Apple claims</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span>
+
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
<span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
+ data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ Technical presentation</a>.</p></em></ins></span>
</li>
- <li id="M201401100">
- <p>The <a class="not-a-duplicate"
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401100">
+ <p>The</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
- <span class="inserted"><ins><em>get other info too.</p>
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
- is totally incompetent</a>.</p>
- </li>
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <li id="M201308080">
- <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210170">
- <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
- </li>
-
- <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p>
- </li>
-
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is snooping on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them from there.</p>
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
+ is <span class="removed"><del><strong>not enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
- days.</p>
+ <li id="M201308080">
+ <p>The iThing also <a
+
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>can be
+ turned off.</p>
+ </li>
+
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
+ still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
</li>
- <li><p>Users</strong></del></span>
+ <li id="M201204280">
+ <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
- <span class="inserted"><ins><em><li id="M201204280">
- <p>Users</em></ins></span> cannot make an Apple ID <span
class="removed"><del><strong><a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>(<a
+<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to install even gratis <span
class="removed"><del><strong>apps)</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>)</em></ins></span> without giving a
valid
- email address and receiving the <span
class="inserted"><ins><em>verification</em></ins></span> code Apple sends
- to it.</p>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
+ to it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1008,357 +929,377 @@
<ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span>
+ <p>Xiaomi phones</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
+ many actions</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking. This is
+ yet another example of</strong></del></span> <span
class="inserted"><ins><em>a song. They send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>location
information</a> of their</strong></del></span>
- <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user, and <a
+ <p>Other</em></ins></span> nonfree <span
class="removed"><del><strong>software pretending to obey the user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>programs snoop too. For instance, Spotify and
+ other streaming dis-services make</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p>
+
+ </li>
+
+ <li><p>More than 73% of the most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>dossier
about each user,</em></ins></span> and <span
class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em><a
href="/malware/proprietary-surveillance.html#M201508210"> they
make</em></ins></span>
users <span class="removed"><del><strong>with third parties.</p>
</li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>identify
themselves</em></ins></span> to <span class="inserted"><ins><em>pay</a>.
Out, out, damned Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>same wrongs
when</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
+ <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span> <span class="inserted"><ins><em>same wrongs
when</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p>
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>culprits are not Chinese,</em></ins></span>
- but <span class="removed"><del><strong>it's active by default so it still
counts as a
- surveillance functionality.</p>
+ <p>The article should not have described these apps as
+ “free”—they</strong></del></span> <span
class="inserted"><ins><em>culprits</em></ins></span> are not <span
class="removed"><del><strong>free software. The clear way to say
+ “zero price” is “gratis.”</p>
- <p>Unknown people apparently took advantage of</strong></del></span>
<span class="inserted"><ins><em>we condemn</em></ins></span> this <span
class="inserted"><ins><em>no matter who does it.</p>
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate,</strong></del></span> <span
class="inserted"><ins><em>Chinese,</em></ins></span>
+ but <span class="removed"><del><strong>is that valid? Software developers
have</strong></del></span> <span class="inserted"><ins><em>we condemn
this</em></ins></span> no <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
- </li>
-
- <li id="M201811230">
- <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>track location even while</em></ins></span>
- in <span class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>airplane mode. It didn't send</em></ins></span> the
<span class="inserted"><ins><em>location data while in
- airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <p>Facebook's app got “consent”</em></ins></span> to
+ <span class="removed"><del><strong>analyze</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically from Android phones</a> while
disguising</em></ins></span>
+ what <span class="removed"><del><strong>users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>the “consent” was
for.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811230">
+ <p>An</em></ins></span> Android <span
class="removed"><del><strong>apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect</strong></del></span> <span class="inserted"><ins><em>phone was
observed</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>track location even while
+ in airplane mode. It didn't send the location data while in
+ airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>data,</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>sent them
all later</a>.</p></em></ins></span>
+ it saved up</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices</strong></del></span>
<span class="inserted"><ins><em><li id="M201711210">
- <p>Android tracks location</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p>
+ <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even</em></ins></span> when <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>“location services”</em></ins></span> are
<span class="removed"><del><strong>sold.
+ Some Motorola</strong></del></span> <span
class="inserted"><ins><em>turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>Google</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can
be</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are</em></ins></span> turned
<span class="removed"><del><strong>off.</p></strong></del></span> <span
class="inserted"><ins><em>off, even when
- the phone has no SIM card</a>.</p></em></ins></span>
+ <li id="M201611150">
+ <p>Some portable</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of</em></ins></span> data to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
+ <span class="inserted"><ins><em><li id="M201609140">
+ <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>completely stop</em></ins></span> the <span
class="removed"><del><strong>system.</p>
</li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-<ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span>
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>tracking. This is
+ yet another example of nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
- <span class="inserted"><ins><em><li id="M201611150">
- <p>Some portable phones</em></ins></span> <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
- </li>
- <li id="M201609140">
- <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>users'
movements without their permission</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from the
- GPS, take photographs, read text messages, read
call,</strong></del></span> location <span class="removed"><del><strong>and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
- when it's actually doing something else. Such a thing would be almost
+<ul>
+ <li><p>The DMCA and</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because
this</strong></del></span> <span class="inserted"><ins><em>user,
+ when it's actually doing something else. Such a thing</em></ins></span>
would <span class="removed"><del><strong>require circumventing the iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>be almost
unthinkable with free software.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
+ obvious way</strong></del></span>
<span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ <p>Samsung phones come with</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
+ transmission is a substantial expense</em></ins></span> for <span
class="removed"><del><strong>you—“We know you
want</strong></del></span> <span class="inserted"><ins><em>users. Said
transmission,
not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
+ of some kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>any
file on the system.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
<span class="inserted"><ins><em><li id="M201308010">
- <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and <span class="removed"><del><strong>laptops</a>.
- (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in
Android phones
+ and laptops</a> (presumably Windows laptops).
Here</em></ins></span> is <span class="removed"><del><strong>snooping on
+ them.</p></li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
+ <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201307280">
+ <li id="M201307280">
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ by Google, use a modified version</em></ins></span> of <span
class="inserted"><ins><em>Android that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span>
<span class="inserted"><ins><em><li id="M201307250">
- <p>A Motorola phone <a
+ <p>A Motorola</em></ins></span> phone <span
class="removed"><del><strong>number that the user types into it</a>; the
server records these numbers</strong></del></span> <span
class="inserted"><ins><em><a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens</em></ins></span> for <span class="removed"><del><strong>at least
30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>voice all the
time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>code Apple
+ sends to it.</p>
+ </li>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>personal details</em></ins></span> of <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>is not enough</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
- hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
+ reading</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>“Terms</em></ins></span> and
+ <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>Conditions” that spell out
what</em></ins></span>
+ they <span class="removed"><del><strong>make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make</strong></del></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
+ </p></blockquote>
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span
class="inserted"><ins><em>“consenting” to. Google should clearly
and
+ honestly identify</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>collects on users, instead</em></ins></span> of
<span class="removed"><del><strong>this</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+
+ <p>However,</em></ins></span> to <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>dis-service spy on users even more than users
- expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
- </p>
+ <p>E-books</em></ins></span> can <span
class="removed"><del><strong>access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span class="inserted"><ins><em>contain JavaScript
code,</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p>
+ </li>
- <p>Don't be tracked — pay cash!</p></strong></del></span>
+ <li><p>There is also a feature for web sites to track users,
which is</strong></del></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it
+ is still true in iOS 7.)</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a></strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ the e-reader used</em></ins></span> by <span
class="removed"><del><strong>default, though that can be
+ turned off.</p>
</li>
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</strong></del></span>
+ <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>most US libraries,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note that this article
misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>check
DRM!</p></em></ins></span>
+ send lots of</em></ins></span> data <span
class="removed"><del><strong>from iPhones for the
state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to Adobe</a>. Adobe's “excuse”:
it's
+ needed to check DRM!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>Facebook's app listens all</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all the data</strong></del></span>
<span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>people are listening to or watching</a>. In
addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>an iThing,
+ or it is totally incompetent.</a></p>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal
data</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at what
time</a>.</p></em></ins></span>
+ </li>
+</ul>
-<div class="big-section">
- <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>the device</a>.
- </p>
- </li>
- <li>
- <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
+<div <span class="inserted"><ins><em>class="big-section">
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+<div</em></ins></span> class="big-subsection">
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android apps is
pervasive</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201912190">
- <p>Some Avast and AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop</em></ins></span> on <span class="removed"><del><strong>some of its
phones. The app will give Verizon the same
- information about the</strong></del></span> users' <span
class="removed"><del><strong>searches that</strong></del></span> <span
class="inserted"><ins><em>detailed browsing habits</a>. Mozilla
and</em></ins></span> Google <span class="removed"><del><strong>normally gets
when
- they use its search engine.</p>
+ <p>Some Avast</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks location</strong></del></span> <span
class="inserted"><ins><em>AVG extensions</em></ins></span>
+ for <span class="removed"><del><strong>Google</strong></del></span> <span
class="inserted"><ins><em>Firefox and Chrome were found to</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>removed</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"></strong></del></span>
<span class="inserted"><ins><em>problematic extensions from their stores, but
this shows
- once more how unsafe nonfree software can be. Tools that are supposed
- to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself</em></ins></span> being <span
class="removed"><del><strong>pre-installed on only one phone</a>, and the
- user must explicitly opt-in before the app takes effect.
However,</strong></del></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>original malware).</p></em></ins></span>
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them to turn the
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop</em></ins></span> on <span class="removed"><del><strong>and off,
listen to the microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and
web</strong></del></span> <span class="inserted"><ins><em>users'
detailed</em></ins></span> browsing <span
class="removed"><del><strong>history,</strong></del></span> <span
class="inserted"><ins><em>habits</a>. Mozilla</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>Google
+ removed</em></ins></span> the <span class="removed"><del><strong>contact
list. This malware is designed</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
+ once more how unsafe nonfree software can be. Tools that are
supposed</em></ins></span>
+ to
+ <span class="removed"><del><strong>disguise</strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
+ additional malware (the system</em></ins></span> itself <span
class="removed"><del><strong>from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>being the original
malware).</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
<span class="inserted"><ins><em><li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
- often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>users can't delete</a>,
+ and they send so much data</strong></del></span> <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="inserted"><ins><em>not</em></ins></span> a
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
- <p>The fact that this is used for repression of forbidden sharing
- makes</em></ins></span> it <span class="removed"><del><strong>can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
-
- <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span> <span class="inserted"><ins><em>nonfree
software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1368,252 +1309,315 @@
<ul class="blurbs">
<li id="M202003010">
- <p>The Alipay Health Code</em></ins></span> app
- <span class="inserted"><ins><em>estimates whether the user has Covid-19
and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <p>The Alipay Health Code app
+ estimates whether</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
tells the cops directly</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M202001290">
- <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
- surveillance <span class="removed"><del><strong>software snoop on what
radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such</strong></del></span> <span class="inserted"><ins><em>for other
companies</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+ and Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
+ <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
<span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging</em></ins></span> app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
- and suggests you to share</strong></del></span> the <span
class="removed"><del><strong>picture you take according to who
- is in</strong></del></span> <span class="inserted"><ins><em>government
of</em></ins></span> the <span class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>United Arab
Emirates</a>.
- Any nonfree program could be doing this, and that is a good
- reason</em></ins></span> to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>use free software instead.</p>
-
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>word
“free” in</em></ins></span>
- the <span class="removed"><del><strong>wire to Facebook's servers and
face-recognition
- algorithms.</p>
+ <p>The ToToc messaging app seems to be a <a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for the government of the United Arab Emirates</a>.
+ Any</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat
app's principal purpose</strong></del></span> <span
class="inserted"><ins><em>program could be doing this, and
that</em></ins></span> is <span class="inserted"><ins><em>a good
+ reason</em></ins></span> to <span class="removed"><del><strong>restrict
+ the</strong></del></span> use <span class="inserted"><ins><em>free
software instead.</p>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
+ <p><small>Note: this article uses the word “free”
in
+ the sense</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
when used for work, give employers powerful <a
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a></em></ins></span> if <span
class="inserted"><ins><em>they install their own
- software on</em></ins></span> the <span class="removed"><del><strong>user
didn't “upload” them</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand</em></ins></span> to
<span class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ snooping and sabotage capabilities</a> if they install their own
+ software</em></ins></span> on the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span> <span class="inserted"><ins><em>device.
Many employers demand</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>user's list of</strong></del></span>
+ <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
+ and as dangerous as any</em></ins></span> other <span
class="removed"><del><strong>people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>nonfree software.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span>
- <span class="inserted"><ins><em>employee, this</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware
(DRM</strong></del></span> <span class="inserted"><ins><em>simply nonfree
software, as fundamentally unjust</em></ins></span>
- and <span class="removed"><del><strong>snooping). In August
- 2015</strong></del></span> <span class="inserted"><ins><em>as dangerous
as any other nonfree software.</p>
- </li>
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant</em></ins></span> it
<a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
+ the Great Nation”</em></ins></span> app <span
class="removed"><del><strong>and dis-service spy on users even more
than</strong></del></span> <span
class="inserted"><ins><em>requires</em></ins></span> users
+ <span class="removed"><del><strong>expected. It</strong></del></span>
<span class="inserted"><ins><em>to grant it</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>the
phone's microphone, photos, text messages, contacts, and
- internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
+ access to the phone's microphone, photos, text messages,
contacts,</em></ins></span> and <span class="removed"><del><strong>after
going</strong></del></span>
+ <span class="inserted"><ins><em>internet history</a>, and the
Android version was found</em></ins></span> to <span
class="inserted"><ins><em>contain</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
+ </p>
- <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>Android version was found to
contain</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing
developers</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether</strong></del></span> <span class="inserted"><ins><em>run any
code</em></ins></span> they <span class="removed"><del><strong>want that. This
is a typical example of</strong></del></span> <span
class="inserted"><ins><em>wish in</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version</em></ins></span> of the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
+ <p>Don't be tracked — pay cash!</p>
+ </li>
- <p>Out, out, damned Spotify!</p>
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
</li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
- saying</em></ins></span> that <span class="removed"><del><strong>at least
is visible and
- optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
+
+ <li><p>The Sarahah</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish in the users'
+ phone, as “superusers.” Downloading and using
this</em></ins></span>
+ app <span class="inserted"><ins><em>is mandatory at some
workplaces.</p>
+
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email
addresses</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in <span
class="removed"><del><strong>user's address
+ book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>a text editor) includes a clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>this
article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <li>
+ <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>tests were only
performed</em></ins></span> on <span class="removed"><del><strong>what people
are listening</strong></del></span> <span class="inserted"><ins><em>the Android
version
+ of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it
may</strong></del></span> <span class="inserted"><ins><em>Apple, “this
kind of
+ ‘superuser’ surveillance could not</em></ins></span> be <span
class="removed"><del><strong>analyzing people's conversations to serve them
with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>conducted on
+ Apple's operating system.”</p></em></ins></span>
</li>
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>tests were only performed</em></ins></span> on the
<span class="removed"><del><strong>user</a>. This is in addition to
- the snooping done by</strong></del></span> <span
class="inserted"><ins><em>Android version
- of</em></ins></span> the <span class="removed"><del><strong>phone
company,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this
kind</em></ins></span> of <span class="removed"><del><strong>whether
the</strong></del></span>
- <span class="inserted"><ins><em>‘superuser’ surveillance could
not be conducted on
- Apple's operating system.”</p>
- </li>
-
- <li id="M201909091">
- <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>developers get</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks</em></ins></span> users <span class="removed"><del><strong>to say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>even when it</em></ins></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight</strong></del></span> <span
class="inserted"><ins><em>turned off</a>, after tricking them
- into giving the</em></ins></span> app
- <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>use one of its
- functionalities.</p>
+ <span class="inserted"><ins><em><li id="M201909091">
+ <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when</em></ins></span> it <span
class="removed"><del><strong>demands to personal data in</strong></del></span>
<span class="inserted"><ins><em>is turned off</a>, after tricking them
+ into giving</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</strong></del></span> app <span
class="removed"><del><strong>that it will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order to use
one</em></ins></span> of its <span class="removed"><del><strong>phones. The app
will give Verizon the same
+ information about the</strong></del></span>
+ <span class="inserted"><ins><em>functionalities.</p>
</li>
<li id="M201909090">
<p>Some nonfree period-tracking apps including MIA Fem and Maya <a
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
<span class="inserted"><ins><em>Facebook</a>.</p>
+ send intimate details of</em></ins></span> users' <span
class="removed"><del><strong>searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>lives to Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>list</em></ins></span> of <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>10,000 or more people
+ program is a form of surveillance. There</em></ins></span> is <span
class="inserted"><ins><em>a
+ proprietary program for adjusting a certain telescopic rifle
sight.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in before</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>list of all</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
who have installed it</a>.</p>
- <p>With</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information to anyone? A</strong></del></span> free <span
class="removed"><del><strong>software flashlight
- app</strong></del></span> <span class="inserted"><ins><em>program
there</em></ins></span> would <span
class="removed"><del><strong>not.</p></strong></del></span> <span
class="inserted"><ins><em>not be a list of who has installed
+ <p>With a free program there would not be a list</em></ins></span>
of <span class="removed"><del><strong>spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>who has installed
it.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
<span class="inserted"><ins><em><li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways to <a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system,</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>a Chinese
company</a>.</p></li>
-<ul>
-
- <li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>order</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>gather as much private data as
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features</em></ins></span>
+ of <span class="removed"><del><strong>data in</strong></del></span> the
<span class="removed"><del><strong>phone, and</strong></del></span> <span
class="inserted"><ins><em>operating system,</em></ins></span> in <span
class="removed"><del><strong>server accounts, it</strong></del></span> <span
class="inserted"><ins><em>order to gather as much private data as
they possibly can.</p>
- <p>Thus, we can't trust rules against spying. What we can trust is
+ <p>Thus, we can't trust rules against spying. What
we</em></ins></span> can
+ <span class="removed"><del><strong>alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'</strong></del></span>
<span class="inserted"><ins><em>trust is
having control over the software we run.</p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
+ users'</em></ins></span> movements <span
class="removed"><del><strong>before and after</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to
locations</a>.</p></em></ins></span>
+
+ <p>This <span class="removed"><del><strong>example illustrates how
“getting the user's consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>involves an apparently unintentional weakness in
Android,
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
requirement to run a proprietary phone app</a> to be allowed into
the event.</p>
- <p>This app is a spyware that can snoop on a lot</em></ins></span> of
- <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>conversation between two</strong></del></span>
<span class="inserted"><ins><em>phone.</p>
+ <p>This app is a spyware that can</em></ins></span> snoop on <span
class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>a lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>contact list,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p>
+ </li>
+
+ <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>has</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+ <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p>
+ available</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>picture you
take according to who</strong></del></span>
+ <span class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>in the frame.</p>
+
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>“anonymized
and aggregated,” it can easily be
+ traced back</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
+ these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
+ free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>you is
available from</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows the</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
+ a <span class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>movements</em></ins></span> of <span
class="inserted"><ins><em>Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
+ saves</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
+ those they have subjugated.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible</em></ins></span> for
<span class="removed"><del><strong>children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>sending
+ the location data to Google.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903251">
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree</em></ins></span> apps <span
class="removed"><del><strong>snoop on the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>that have
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data
without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>snooping done
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to
user-installed apps that have access to</em></ins></span>
+ the <span class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>network but no direct
access to</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data. This results</em></ins></span> in <span
class="inserted"><ins><em>massive
+ surveillance on which</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by the question of whether the app
developers get
+ users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>control.</p></em></ins></span>
</li>
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
- </li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which
can</em></ins></span> use <span class="removed"><del><strong>by
companies.</a></p>
+
+ <p>The FTC criticized this app because</strong></del></span> it
<span class="removed"><del><strong>asked the</strong></del></span>
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
+ <p>Whenever</em></ins></span> user <span
class="inserted"><ins><em>“consent” is sought, it is buried in
+ lengthy terms of service that are difficult</em></ins></span> to
+ <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
@@ -1621,47 +1625,63 @@
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ sent</em></ins></span> personal data to <span
class="removed"><del><strong>the app developer but did</strong></del></span>
<span class="inserted"><ins><em>Facebook</a>. Lots of companies built
apps that
+ way and released them, apparently</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the
personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>other companies. This</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+
+ <p>It</em></ins></span> shows <span class="inserted"><ins><em>that
no one can trust a nonfree program, not even</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ 78,000 have been analyzed,</em></ins></span> of <span
class="inserted"><ins><em>which 24,000 (31%) transmit</em></ins></span> the
<span class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>anyone? A free</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
- <li id="M201902060">
+ <span class="inserted"><ins><em><li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span>
+ <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="inserted"><ins><em>“beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>conversation</strong></del></span>
<span class="inserted"><ins><em>user interface of most of them was designed to
make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
@@ -1844,9 +1864,9 @@
<li id="M201705230">
<p>Apps for BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on</em></ins></span> users</a>.</p>
+ snoop on users</a>.</p>
- <span class="inserted"><ins><em><p>With free software apps, users
could <em>make sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
@@ -2160,7 +2180,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally, we see no difference between having human workers listen
and
+ <p>Morally, we see no difference</em></ins></span> between <span
class="removed"><del><strong>two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>having human workers listen and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -3734,7 +3754,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:26 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary-surveillance.de.po 25 Jun 2020 23:01:26 -0000 1.329
+++ proprietary-surveillance.de.po 26 Jun 2020 23:31:13 -0000 1.330
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1175,6 +1175,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a href=\"http://www.northwestern.edu/newscenter/stories/2016/01/"
"fool-activity-tracker.html\"> proprietary software to make sure they can't "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-surveillance.es.po 26 Jun 2020 00:29:36 -0000 1.45
+++ proprietary-surveillance.es.po 26 Jun 2020 23:31:13 -0000 1.46
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-06-25 19:43-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2\n"
@@ -852,6 +853,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a href=\"http://www.northwestern.edu/newscenter/stories/2016/01/"
"fool-activity-tracker.html\"> proprietary software to make sure they can't "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.508
retrieving revision 1.509
diff -u -b -r1.508 -r1.509
--- proprietary-surveillance.fr.po 26 Jun 2020 14:57:13 -0000 1.508
+++ proprietary-surveillance.fr.po 26 Jun 2020 23:31:13 -0000 1.509
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-06-26 16:56+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -848,6 +849,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a href=\"http://www.northwestern.edu/newscenter/stories/2016/01/"
"fool-activity-tracker.html\"> proprietary software to make sure they can't "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary-surveillance.it-diff.html 25 Jun 2020 23:01:26 -0000
1.180
+++ proprietary-surveillance.it-diff.html 26 Jun 2020 23:31:13 -0000
1.181
@@ -571,22 +571,19 @@
It also uses the ugly word “monetize”. A good replacement
for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
“clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
- own malware</a>.</p>
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>not really clean since <a
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ own malware</a>.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With</strong></del></span> <span
class="inserted"><ins><em>Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -597,41 +594,54 @@
</div>
<ul class="blurbs">
- <li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps, one can only hope
that</strong></del></span> <span class="inserted"><ins><em>software to make
sure</em></ins></span> they <span
class="removed"><del><strong>don't.</p></strong></del></span> <span
class="inserted"><ins><em>can't “fool”
- the monitoring</a>.</p></em></ins></span>
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop</em></ins></span>
on <span class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps,</strong></del></span> users <span
class="removed"><del><strong>could <em>make sure</em> that they
don't snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps</strong></del></span> <span
class="inserted"><ins><em>Biden's app has a less manipulative overall
+ approach, but</em></ins></span> that <span
class="removed"><del><strong>track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>does not tell us whether it has
functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked</em></ins></span> to <span class="removed"><del><strong>ultrasound
from beacons placed in stores or played by TV programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>send.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <p>Pairs</strong></del></span>
- <span class="inserted"><ins><em><li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
- </p>
+ <span class="inserted"><ins><em><li id="M201601110">
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
+ data to servers.</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p></em></ins></span>
+ </li>
-</li>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
-<li>
- <p>Pairs of Android apps</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
+ <span class="inserted"><ins><em><li id="M201510050">
+ <p>According to Edward Snowden,</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
- data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+ them to turn</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>phones on and
off, listen to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
text messages, read call, location and web browsing history, and
- read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ read the contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -665,9 +675,9 @@
will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
<p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
+ disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
+ <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones
to have GPS.)</p>
</li>
</ul>
@@ -717,46 +727,56 @@
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
legitimate, but</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
- and DoorDash. But it</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ and DoorDash. But it</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers
have</strong></del></span> <span class="inserted"><ins><em>most nonfree apps
contain
+ trackers. Some of these send personally identifying data such as phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is</em></ins></span> no <span
class="removed"><del><strong>right to
+ analyze</strong></del></span> <span
class="inserted"><ins><em>telling</em></ins></span> what <span
class="removed"><del><strong>users are doing or how. “Analytics”
tools that snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>it will be
+ used for.</p></em></ins></span>
</li>
- <li><p>Gratis Android</strong></del></span> <span
class="inserted"><ins><em>most nonfree</em></ins></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on the average.</p>
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> the <span
class="removed"><del><strong>average.</p>
</li>
- <li><p>Spyware is present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>contain
- trackers.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em>of these</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>personally identifying</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
</li>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
+ <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p></em></ins></span>
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span class="removed"><del><strong>any
file</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy</em></ins></span> on <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS:</strong></del></span>
+<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy</em></ins></span> on
<span class="removed"><del><strong>Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -768,17 +788,7 @@
</div>
<ul>
- <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
- this would require circumventing the iOS DRM.</p>
- </li>
-
- <li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p>
</li>
<li id="M201702150">
@@ -847,90 +857,90 @@
security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <li><p>Spyware in iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
- <li id="M201409220">
+ <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which
is</strong></del></span> <span class="inserted"><ins><em>the
state</a>.</p>
- <p>This may have improved with <a
-
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
- iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks
about</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"></em></ins></span>
+ iOS <span class="removed"><del><strong>6,</strong></del></span> <span
class="inserted"><ins><em>8 security improvements</a>;</em></ins></span>
but <span class="removed"><del><strong>it
+ is still true in iOS 7.)</p>
</li>
- <li id="M201407230">
+ <li><p>The iThing also</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>claims</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <a
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem to exist</em></ins></span>
+ for <span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em><a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a</em></ins></span> class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ get other info too.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
+ <span
class="removed"><del><strong><li><p><a</strong></del></span>
<span class="inserted"><ins><em><li id="M201312300">
- <p><a
+ <p><a</em></ins></span>
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or
it</em></ins></span>
- is <span class="inserted"><ins><em>totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
+ is totally <span
class="removed"><del><strong>incompetent.</a></p></strong></del></span>
<span
class="inserted"><ins><em>incompetent</a>.</p></em></ins></span>
</li>
- <li id="M201308080">
- <p>The iThing</em></ins></span> also <span
class="removed"><del><strong>a feature for web sites to track users,
which</strong></del></span> <span class="inserted"><ins><em><a
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308080">
+ <p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track users,
which</em></ins></span> is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <p>There is also a feature</em></ins></span> for <span
class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track
users, which</em></ins></span> is <span
class="removed"><del><strong>the</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
- <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
+ <li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ email address and receiving the verification code Apple sends
+ to it.</p></em></ins></span>
</li>
</ul>
@@ -949,37 +959,34 @@
by sending hidden text messages which enable them to
turn</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
many actions</em></ins></span> the <span
class="removed"><del><strong>phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>a song. They
send device identifying
+ on</strong></del></span> <span class="inserted"><ins><em>user
takes</a>: starting an app, looking at a folder,
+ visiting a website, listening to a song. They send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>web
- browsing history,</strong></del></span>
- <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span>
+ <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user, and <a
href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
+ users identify themselves</em></ins></span> to <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>same wrongs when
the culprits are not Chinese,
+ <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
- <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em><a
+ <p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p></em></ins></span>
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811230">
+ <li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
- airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ airplane mode. Instead, <a
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
@@ -1000,16 +1007,19 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</em></ins></span>
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung</em></ins></span> phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
@@ -1054,116 +1064,100 @@
sold. Some Motorola phones, made when this company was owned
by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>on the user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>to
Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone <a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>users is not enough</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span>
+ <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
<span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions”</em></ins></span>
that <span class="inserted"><ins><em>spell out what
+ reading</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install</strong></del></span> <span
class="inserted"><ins><em>collects</em></ins></span> on <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
- information about the users' searches that</strong></del></span>
+ honestly identify the information it collects on users,
instead</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span>
<span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
- <p>However, to truly protect people's privacy, we must
prevent</em></ins></span> Google <span class="removed"><del><strong>normally
gets when
- they use its search engine.</p>
-
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
- and <span class="inserted"><ins><em>other companies from getting this
personal information in</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span>
- <span class="inserted"><ins><em>first place!</p></em></ins></span>
+ <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201111170">
- <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201111170">
+ <p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance,
judging</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used</em></ins></span> by <span
class="inserted"><ins><em>most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of</em></ins></span> data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
- alter them too</a>.
- </p></li>
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets
when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"></em></ins></span>
they <span class="removed"><del><strong>use its search engine.</p>
- <p>This example illustrates</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at what time</a>.</p>
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span class="inserted"><ins><em>report even which page</em></ins></span>
the user <span class="removed"><del><strong>must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
+ <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>the phone,</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1175,11 +1169,18 @@
<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast and AVG extensions
- for Firefox and Chrome were found to <a
-
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>. Mozilla and Google
- removed the problematic extensions from their stores, but this shows
+ <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
+ for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>Google
+ removed</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
once more</em></ins></span> how <span
class="removed"><del><strong>“getting</strong></del></span> <span
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are
supposed
to protect a proprietary system are, instead, infecting it with
additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
@@ -1235,17 +1236,18 @@
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>the
government of the United Arab Emirates</a>.
- Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>that is a good
- reason</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>use free software instead.</p>
-
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
- is</strong></del></span> <span class="inserted"><ins><em>word
“free”</em></ins></span> in
- the <span class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ spying tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
+ and suggests you to share</strong></del></span> the <span
class="removed"><del><strong>picture you take according to who
+ is in</strong></del></span> <span class="inserted"><ins><em>government
of</em></ins></span> the <span class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>United Arab
Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
+ reason</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>use free software instead.</p>
+
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>word
“free” in</em></ins></span>
+ the <span class="removed"><del><strong>wire to Facebook's servers and
face-recognition
algorithms.</p>
<p>If so, none</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
@@ -1307,12 +1309,12 @@
<li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>tests were only performed</em></ins></span> on the
<span class="removed"><del><strong>user</a>. This is in addition to
- the snooping done by</strong></del></span> <span
class="inserted"><ins><em>Android version
- of</em></ins></span> the <span class="removed"><del><strong>phone
company,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ the snooping done by the phone company, and perhaps by the OS in the
phone.</p>
- <p>Don't be distracted by the question of whether the app
developers get
- users</strong></del></span> <span class="inserted"><ins><em>that,
according</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Apple, “this kind of
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
+ of <span class="removed"><del><strong>whether</strong></del></span> the
<span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>app, and
that, according</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p></em></ins></span>
</li>
@@ -1361,63 +1363,63 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
<span class="inserted"><ins><em><li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>then sends personal</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of the operating system, in order to gather as much
private</em></ins></span> data <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>as
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="inserted"><ins><em>privacy-enhancing features
+ of</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>operating
system, in order</em></ins></span> to <span class="removed"><del><strong>spy
through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ having control over the software we run.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
- <li id="M201907080">
+ <span class="inserted"><ins><em><li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
- </li>
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
+ <li id="M201905300"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>companies,
and the NSA takes advantage to spy through it too</a>.
- Here's information</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
requirement</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
@@ -1458,17 +1460,17 @@
these apps, even if someone offers you a reward to do so. A
free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span>
+ was sued for collecting lots</strong></del></span>
<span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
@@ -1513,70 +1515,70 @@
sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
- way <span class="removed"><del><strong>to access the data</a>
- collected by the manufacturer's snooping.</p>
+ way <span class="removed"><del><strong>to access</strong></del></span>
<span class="inserted"><ins><em>and released them, apparently not realizing
that all</em></ins></span> the <span class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span
class="inserted"><ins><em>personal
+ data they collected would go to Facebook as well.</p>
- <p>That the manufacturer</strong></del></span> and <span
class="inserted"><ins><em>released them, apparently not realizing that
all</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ <p>That</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
<li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span>
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>Low
Level</h3>
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span>
- <span class="inserted"><ins><em>preventing nonfree software developers
from including malware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p>
- </li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
-
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
@@ -1589,28 +1591,23 @@
haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+<span class="removed"><del><strong>clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>do.</p>
</li>
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
+ potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1620,12 +1617,17 @@
<ul>
<li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span> <span class="inserted"><ins><em>users.
Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>10
gratis VPN apps have lousy privacy policies</a>.</p>
+ <p>Specifically, it can collect the emails of
members</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
+ this way, because</strong></del></span>
+ <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
<p><small>(It is unfortunate that these articles talk about
“free
apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
@@ -1698,48 +1700,46 @@
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+ <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
+ Kindle:</strong></del></span>
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>report even which page</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"></em></ins></span>
+ report <span class="removed"><del><strong>even which
page</strong></del></span> <span class="inserted"><ins><em>on</em></ins></span>
the <span class="removed"><del><strong>user reads at what
time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>user's
actions to Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>e-reader used
by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></strong></del></span>
<span class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them</em></ins></span> send <span
class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em>Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>whether the user has a Facebook
+ account.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>the app; others only
say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
- <li id="M201810244">
+ <span class="inserted"><ins><em><li id="M201810244">
<p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
snooping devices</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
@@ -1779,24 +1779,27 @@
<p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ though.</p>
+ </li>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
+ <li id="records-drivers"><p>Proprietary
software</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn to care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection
systems, mentioned in this article, is not
- really a matter</strong></del></span> <span
class="inserted"><ins><em>the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary
<span class="removed"><del><strong>surveillance. These systems are an
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
intolerable invasion of privacy, and should be replaced with anonymous
payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at.</em></ins></span> The other
@@ -1832,131 +1835,152 @@
<ul>
<li><p>Nest thermometers
- send</strong></del></span>
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data</strong></del></span>
<span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
+ <p>Grindr collects information</em></ins></span> about <span
class="inserted"><ins><em><a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p>
+ </li>
- <p>Grindr should not have so much information</em></ins></span>
about <span class="inserted"><ins><em>its users.
- It could be designed so that users communicate such info to each
- other but not to</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>spy on their renters</a>.</p>
</li>
+</ul>
+
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+<p>Emo Phillips made a joke: The</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to
each</em></ins></span>
+ other <span class="removed"><del><strong>day a woman came
up</strong></del></span> <span class="inserted"><ins><em>but
not</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>the server's database.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li id="M201803050">
+ <p>The moviepass app</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see
you</strong></del></span> <span class="inserted"><ins><em>dis-service
+ spy</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span>
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected.
It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just
broadcasts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if the
image</strong></del></span> <span class="inserted"><ins><em>after going to a
movie</a>.</p>
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
+ <p>Don't be tracked—pay cash!</p>
+ </li>
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps</em></ins></span>
+ is <span class="removed"><del><strong>coming from
the</strong></del></span> <span class="inserted"><ins><em>pervasive and
sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up to me</strong></del></span> <span class="inserted"><ins><em>physical
store by noticing WiFi
+ follow a</em></ins></span> user's <span class="removed"><del><strong>own
+ computer, the TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>movements
around</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server.</p>
+ uploads all phone numbers and email addresses</a> in user's address
+ book</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>developer's server.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the words
+ <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>surveillance, even if it
were</strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.)</small></p>
</li>
<li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages</em></ins></span> and <span
class="inserted"><ins><em>emails to snoopers</a>.</p>
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did</em></ins></span> not <span
class="removed"><del><strong>just broadcasts</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>deleted these apps after
+ <p>Google did</em></ins></span> not <span
class="removed"><del><strong>hidden as</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the
contrary,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span>
+ <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="inserted"><ins><em>various ways to prevent that, and
deleted</em></ins></span> these <span class="removed"><del><strong>TVs, does
not legitimize</strong></del></span> <span class="inserted"><ins><em>apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
+ for</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on</strong></del></span> <span class="inserted"><ins><em>snooping of these
apps.</p>
- <p>On</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps, and
- therefore shares in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>responsibility
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their
being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice
of</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
+
+ <p>The report was</strong></del></span> <span
class="inserted"><ins><em>being
+ nonfree. It also distributes its own nonfree apps, such</em></ins></span>
as <span class="inserted"><ins><em>Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
- cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
+ <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in</strong></del></span> <span class="inserted"><ins><em>source code
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>surveillance.</p>
- </li>
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>preventing apps from
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>inspect
executable proprietary apps to see</em></ins></span> what <span
class="removed"><del><strong>happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>they
do.</p>
- <li><p>More</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
- various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
+ the source code somehow</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p>The report was as of 2014, but we don't expect this
has</strong></del></span>
- <span class="inserted"><ins><em>prevent such snooping, except when the app
developers are clever
- enough to outsmart the checking.</p>
+ <p>Proper laws would say that TVs</strong></del></span> <span
class="inserted"><ins><em>app developers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>clever
+ enough</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ public, so we can depend</em></ins></span> on
+ <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>each
other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
+ <p>With proprietary apps, one</em></ins></span> can <span
class="inserted"><ins><em>only hope that they don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ <p>A study found 234 Android apps that</em></ins></span> track <span
class="removed"><del><strong>you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
+ to <span class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>ultrasound from
beacons placed in stores or played</em></ins></span> by <span
class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>TV
+ programs</a>.</p></em></ins></span>
</li>
- <li id="M201704260">
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704260">
<p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands</em></ins></span> to <span
class="inserted"><ins><em>personal data in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
</li>
<li id="M201704190">
@@ -2497,10 +2521,10 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this
has</em></ins></span> got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em>laws requiring
products to get users' formal
+ <p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
say, “Without your consent to tracking, the TV will not
@@ -2765,13 +2789,12 @@
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal data are</strong></del></span> <span
class="inserted"><ins><em>make sure the user is still
+ communicates with HP servers</a> to make sure the user is still
paying for the subscription, and hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves</em></ins></span> totally
<span class="removed"><del><strong>inadequate.</strong></del></span> <span
class="inserted"><ins><em>unacceptable
+ specific cases, it spies on users, and involves totally unacceptable
restrictions in the use of ink cartridges that would otherwise be in
working order.</p>
</li>
@@ -2782,49 +2805,45 @@
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
- <p><small>(These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ <p><small>(These crackers are probably hackers too, but please
<a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
+ <li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that snoops on its user
by
+ offers a gratis electronic toothbrush that snoops on its user by
sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone</em></ins></span> in <span
class="inserted"><ins><em>the house, all the time</a>.</p>
+ listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without
potentially</em></ins></span> spying
- on <span class="inserted"><ins><em>you. Even if it is air-gapped, it
could be saving up records
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
about you for later examination.</p>
</li>
<li id="M201407170">
<p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about the user</a>.</p>
+ data about</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on</em></ins></span> their
<span class="removed"><del><strong>users: their</strong></del></span> <span
class="inserted"><ins><em>renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
@@ -2850,22 +2869,16 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>online
+ social media participation, Tivo can</strong></del></span> <span
class="inserted"><ins><em>an Android app <a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
+ <li id="M201407090">
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
@@ -2881,33 +2894,30 @@
<ul class="blurbs">
<li id="M201912171">
- <p>Most modern cars now <a
-
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
- cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ <p>Most modern cars</em></ins></span> now <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>running with
+ proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data
goes</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing all users</strong></del></span>
- <span class="inserted"><ins><em>them</a>.</p>
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>a
junkyard the driver's personal data goes with
+ them</a>.</p>
</li>
<li id="M201902011">
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
@@ -3522,7 +3532,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:26 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary-surveillance.it.po 25 Jun 2020 23:01:26 -0000 1.341
+++ proprietary-surveillance.it.po 26 Jun 2020 23:31:13 -0000 1.342
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1150,6 +1150,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a href=\"http://www.northwestern.edu/newscenter/stories/2016/01/"
"fool-activity-tracker.html\"> proprietary software to make sure they can't "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-surveillance.ja-diff.html 25 Jun 2020 23:01:26 -0000
1.197
+++ proprietary-surveillance.ja-diff.html 26 Jun 2020 23:31:13 -0000
1.198
@@ -550,23 +550,29 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>More than 73% of</strong></del></span>
+ <li><p>More than 73% of the most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201509220">
<p><a
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
- Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note that</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>specific
- sabotage method Lenovo used did not affect GNU/Linux; also, a
- “clean” Windows install is not really clean
since</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
- own malware</a>.</p></em></ins></span>
+ Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span class="inserted"><ins><em>spyware via
+ BIOS</a> on Windows installs. Note that</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
+ “clean” Windows install is not really clean
since</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the 500 most
popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>its
+ own malware</a>.</p>
+ </li>
+</ul>
@@ -582,67 +588,72 @@
</div>
<ul class="blurbs">
- <li id="M201601110">
+ <li id="M202006260">
+ <p>Most</em></ins></span> apps <span class="removed"><del><strong>as
+ “free”—they</strong></del></span> are <span
class="removed"><del><strong>not free software. The clear way to say
+ “zero price”</strong></del></span> <span
class="inserted"><ins><em>malware, but
+ Trump's campaign app, like Modi's campaign app,</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p></strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>takes for
granted</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> that <span
class="removed"><del><strong>the usual analytics tools are
+ legitimate,</strong></del></span> <span class="inserted"><ins><em>Biden's
app has a less manipulative overall
+ approach,</em></ins></span> but <span class="removed"><del><strong>is that
valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics”
tools</strong></del></span> that <span class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but</strong></del></span> <span
class="inserted"><ins><em>does</em></ins></span> not <span
class="removed"><del><strong><a href="/philosophy/free-sw.html">free
software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>tell us whether
it has functionalities we
+ consider malicious, such as sending data</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>user has not explicitly
+ asked to send.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
<p>The natural extension of monitoring
- people through “their” phones is <a
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices
when</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
- the <span class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ proprietary software to make sure</em></ins></span> they <span
class="removed"><del><strong>are sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>can't “fool”
+ the monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span>
+ <p>According</em></ins></span> to <span
class="inserted"><ins><em>Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as any other snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the microphone,
- retrieve geo-location data from the GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>web browsing
history, and
- read</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>designed to disguise itself
- from investigation.</p>
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location</em></ins></span> data <span
class="inserted"><ins><em>from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>disguise itself
+ from investigation.</p></em></ins></span>
</li>
- <li id="M201311120">
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola</strong></del></span> <span
class="inserted"><ins><em>smart phones, including iPhones,
+ The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable</em></ins></span>
- phones <span class="removed"><del><strong>modify Android
to</strong></del></span> <span class="inserted"><ins><em>have. It may involve
exploiting various bugs. There are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any
file</strong></del></span>
<span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>the system.</p></strong></del></span> <span
class="inserted"><ins><em>remote command, and users cannot stop
them</a>. (The US says it will eventually require all new portable
phones
to have GPS.)</p></em></ins></span>
@@ -679,20 +690,19 @@
</li>
<li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</strong></del></span> <span
class="inserted"><ins><em>Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs</em></ins></span> that <span
class="inserted"><ins><em>possibly correspond to
+ a server every phone number that the user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>Apple
devices in China to</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="removed"><del><strong>user types
into it</a>;</strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
- contains</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>websites of political opponents. By linking the
requests
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
+ dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
</li>
- <li id="M201905280">
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
<p>In spite of Apple's supposed commitment to
privacy, iPhone apps contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
@@ -781,42 +791,27 @@
<li><p>Spyware in iThings:
the <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does, <a
+ <li id="M201409220">
+ <p>Apple can,</em></ins></span> and <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which
is</strong></del></span> <span class="inserted"><ins><em>the
state</a>.</p>
+ remotely extract some data from iPhones for the state</a>.</p>
- <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks
about</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"></em></ins></span>
- iOS <span class="removed"><del><strong>6,</strong></del></span> <span
class="inserted"><ins><em>8 security improvements</a>;</em></ins></span>
but <span class="removed"><del><strong>it
- is still true in iOS 7.)</p>
+ <p>This may have improved with <a
+
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
+ iOS 8 security improvements</a>; but <a
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
- <li><p>The iThing also</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
- <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>claims</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
+ <li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</em></ins></span>
- for <span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em><a
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the
<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -825,22 +820,19 @@
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p></em></ins></span>
+ get</em></ins></span> other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
<span class="inserted"><ins><em><li id="M201312300">
- <p><a</em></ins></span>
+ <p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally <span
class="removed"><del><strong>incompetent.</a></p></strong></del></span>
<span
class="inserted"><ins><em>incompetent</a>.</p></em></ins></span>
+ is totally incompetent</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308080">
+ <li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
@@ -848,20 +840,41 @@
</li>
<li id="M201210170">
- <p>There is also a feature</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track
users, which</em></ins></span> is <span
class="removed"><del><strong>the</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <li id="M201204280">
- <p>Users cannot make an Apple ID (<a
+ <span class="removed"><del><strong><li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p></em></ins></span>
+ email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
+ to <span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
</li>
</ul>
@@ -889,21 +902,21 @@
href="/malware/proprietary-surveillance.html#M201508210"> they make
users identify themselves</em></ins></span> to <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
+ <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location
data</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -983,55 +996,30 @@
<p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other
people's</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola</em></ins></span> phone
- <span
class="removed"><del><strong>numbers.</a></p></strong></del></span>
<span class="inserted"><ins><em><a
+ <p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-<ul>
-
- <li><p>The Uber</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span>
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
<span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>ride</a>.</p>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>personal
details of users that install</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a
protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps</strong></del></span> <span
class="inserted"><ins><em>not enough to
+ <p>Merely asking the “consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on</strong></del></span> <span
class="inserted"><ins><em>spell out</em></ins></span> what <span
class="removed"><del><strong>radio and TV programs</strong></del></span>
- <span class="inserted"><ins><em>they</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on what users
post</strong></del></span> <span
class="inserted"><ins><em>“consenting” to. Google should clearly
and
- honestly identify the information it collects</em></ins></span> on <span
class="removed"><del><strong>various sites</strong></del></span> <span
class="inserted"><ins><em>users, instead of
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
@@ -1042,21 +1030,40 @@
<li id="M201111170">
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</em></ins></span> such as <span
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users
post</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
@@ -1088,10 +1095,7 @@
</li>
<span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
+ is based on proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1109,7 +1113,10 @@
<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast and AVG extensions
+ <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>Google
@@ -1127,8 +1134,8 @@
twisted ways that they present snooping as a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>identify who</em></ins></span> is <span
class="inserted"><ins><em>running it</a>. The result is
- often</em></ins></span> a <span class="removed"><del><strong>typical
example</strong></del></span> <span class="inserted"><ins><em>legal threat
demanding a lot of money.</p>
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The
result</em></ins></span> is
+ <span class="inserted"><ins><em>often</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span> <span
class="inserted"><ins><em>legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
@@ -1169,43 +1176,40 @@
surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging app seems</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't</strong></del></span> be <span
class="removed"><del><strong>distracted by</strong></del></span> <span
class="inserted"><ins><em>a <a
-
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
- Any nonfree program could be doing this, and that</em></ins></span> is
<span class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a good
- reason to use free software instead.</p>
+ <p>The ToToc messaging app seems to be a</em></ins></span> <a
<span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that</em></ins></span> is
<span class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>a good
+ reason</em></ins></span> to <span class="inserted"><ins><em>use free
software instead.</p>
- <p><small>Note: this article uses the word “free”
in
- the sense of
“gratis.”</small></p></em></ins></span>
- </li>
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS</strong></del></span> <span class="inserted"><ins><em>word
“free”</em></ins></span> in
+ the
+ <span class="removed"><del><strong>phone.</p>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
+ </li>
- <span class="inserted"><ins><em><li id="M201912090">
+ <li id="M201912090">
<p>iMonsters and Android phones,
- when used</em></ins></span> for <span class="removed"><del><strong>use by
companies.</a></p>
-
- <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>work, give employers powerful <a
+ when used for work, give employers powerful <a
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee,</em></ins></span> this <span class="inserted"><ins><em>is simply
nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ software on</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em>device.
Many employers demand</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>do this. For the
+ employee, this</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p></em></ins></span>
</li>
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Chinese Communist
Party's “Study
the Great Nation”</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em>requires users to grant</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
@@ -1542,21 +1546,20 @@
<ul>
<li><p>Computerized cars with nonfree software are
<a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span class="inserted"><ins><em>development
platform are ineffective at
+ that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
- their programs.</p>
+ their programs.</p></em></ins></span>
</li>
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span class="inserted"><ins><em>surveillance
feature for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the
app.</p>
@@ -1751,12 +1754,12 @@
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of</em></ins></span> the <span class="removed"><del><strong>company already
monitors. Tivo customers are unaware they're being
watched</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied</em></ins></span> by
- <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
+ <span class="removed"><del><strong>advertisers. By combining TV
viewing</strong></del></span> <span class="inserted"><ins><em>researchers were
found to snoop
+ and collect</em></ins></span> information <span
class="removed"><del><strong>with online
social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span> <span class="inserted"><ins><em>researchers were
found</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>collect
information about its users</a>. 40% of the apps were
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>about its
users</a>. 40% of the apps were
found</em></ins></span> to <span class="removed"><del><strong>be
picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
@@ -1826,21 +1829,11 @@
could spy this way.</p>
<p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> <span
class="inserted"><ins><em>email addresses</a> in user's address
- book to developer's server.</p>
-
- <p><small>(Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>zero
price.)</small></p></em></ins></span>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
+ networks</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1854,47 +1847,57 @@
<ul>
<li><p>Many</strong></del></span>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ <span class="inserted"><ins><em><li id="M201708270">
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
video game consoles snoop on their users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages and
emails</em></ins></span> to <span
class="inserted"><ins><em>snoopers</a>.</p>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>email addresses</a> in user's address
+ book</em></ins></span> to <span class="inserted"><ins><em>developer's
server.</p>
- <p>Google did not intend to make these apps spy;
on</em></ins></span> the
- <span class="removed"><del><strong>internet</a>—
even</strong></del></span> <span class="inserted"><ins><em>contrary, it
- worked in various ways to prevent that, and deleted these apps after
- discovering</em></ins></span> what <span
class="removed"><del><strong>their users weigh.</p>
+ <p><small>(Note that this article misuses</em></ins></span>
the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android
apps,</em></ins></span> and <span class="removed"><del><strong>you can't trust
a computer with
- a</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice of their being
- nonfree. It also distributes its own</em></ins></span> nonfree <span
class="removed"><del><strong>operating system.</p>
+ <p>A game console is a computer, and you can't trust a computer
with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.)</small></p></em></ins></span>
</li>
- <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>apps, such as Google Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>wide range</strong></del></span> <span
class="inserted"><ins><em>better job</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
- friends and associates</a>.</p>
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
- <p>Even nastier,</strong></del></span> <span
class="inserted"><ins><em>preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what</em></ins></span> they
<span class="removed"><del><strong>do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>do.</p>
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span class="removed"><del><strong>their
users'
+ friends</strong></del></span> <span class="inserted"><ins><em>sent
them</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>data
- collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="removed"><del><strong>sites made by different
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>text messages</em></ins></span> and <span
class="removed"><del><strong>sites made by different
companies.</p>
- <p>They use this data</strong></del></span> <span
class="inserted"><ins><em>study
- the source code somehow</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
+ <p>They use this data</strong></del></span> <span
class="inserted"><ins><em>emails</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>make these apps spy; on the contrary, it
+ worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>hunt</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
+ discovering what they did. So we cannot blame Google
specifically</em></ins></span>
+ for <span class="removed"><del><strong>“whales” who can be led
to spend a lot</strong></del></span> <span class="inserted"><ins><em>the
snooping</em></ins></span> of <span class="removed"><del><strong>money.
They</strong></del></span> <span class="inserted"><ins><em>these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It</em></ins></span> also <span class="removed"><del><strong>use
a back door to</strong></del></span> <span
class="inserted"><ins><em>distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt</strong></del></span> <span class="inserted"><ins><em>outsmart the
checking.</p>
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
@@ -1902,20 +1905,20 @@
</li>
<li id="M201705230">
- <p>Apps</em></ins></span> for <span
class="removed"><del><strong>“whales” who</strong></del></span>
<span class="inserted"><ins><em>BART <a
+ <p>Apps for BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to <span class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by
TV
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -1928,9 +1931,8 @@
<li id="M201704190">
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,
- the app would record the names</em></ins></span> of <span
class="removed"><del><strong>money. They
- also</strong></del></span> <span class="inserted"><ins><em>the audio
files users listen to
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
@@ -1952,8 +1954,8 @@
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when
they</em></ins></span> use
- <span class="inserted"><ins><em>its search engine.</p>
+ about the users' searches that Google normally gets when they use
+ its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
@@ -1966,7 +1968,7 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</em></ins></span> a <span
class="removed"><del><strong>back</strong></del></span> <span
class="inserted"><ins><em>Chinese company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -2268,7 +2270,7 @@
<p>They use this data to manipulate people to buy things, and hunt
for
“whales” who can be led to spend a lot of money. They also
- use a back</em></ins></span> door to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>manipulate the game play for specific
players.</p>
+ use a back door to</em></ins></span> manipulate the <span
class="removed"><del><strong>game play</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
@@ -2956,7 +2958,7 @@
<ul class="blurbs">
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
+ creates the potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
<p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
surveillance ever. All it takes to make this potential real <a
@@ -3371,7 +3373,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:26 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary-surveillance.ja.po 25 Jun 2020 23:01:26 -0000 1.323
+++ proprietary-surveillance.ja.po 26 Jun 2020 23:31:13 -0000 1.324
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -869,6 +869,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a href=\"http://www.northwestern.edu/newscenter/stories/2016/01/"
"fool-activity-tracker.html\"> proprietary software to make sure they can't "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary-surveillance.pot 25 Jun 2020 23:01:26 -0000 1.262
+++ proprietary-surveillance.pot 26 Jun 2020 23:31:13 -0000 1.263
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -632,6 +632,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
"
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a "
"href=\"http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html\">
"
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.604
retrieving revision 1.605
diff -u -b -r1.604 -r1.605
--- proprietary-surveillance.ru.po 26 Jun 2020 05:01:30 -0000 1.604
+++ proprietary-surveillance.ru.po 26 Jun 2020 23:31:13 -0000 1.605
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -837,6 +838,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The natural extension of monitoring people through “their” "
"phones is <a href=\"http://www.northwestern.edu/newscenter/stories/2016/01/"
"fool-activity-tracker.html\"> proprietary software to make sure they can't "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary.de-diff.html 25 Jun 2020 23:01:26 -0000 1.156
+++ proprietary.de-diff.html 26 Jun 2020 23:31:13 -0000 1.157
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -156,14 +156,14 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
@@ -249,19 +262,6 @@
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
-
- <li id="M202005250">
- <p>Tesla's cars have a <a
- href="/proprietary/proprietary-back-doors.html#M201709090.1">
- universal remote back door</a>. Tesla used it to <a
-
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
- disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling the features.</p>
-
- <p>This kind of malfeature is only possible with proprietary
- software—free software is controlled by its users who wouldn't
- let do such things to them.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -324,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:26 $
+$Date: 2020/06/26 23:31:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary.de.po 25 Jun 2020 23:01:26 -0000 1.197
+++ proprietary.de.po 26 Jun 2020 23:31:14 -0000 1.198
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -498,22 +514,6 @@
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary.es.po 26 Jun 2020 00:29:36 -0000 1.279
+++ proprietary.es.po 26 Jun 2020 23:31:14 -0000 1.280
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2\n"
@@ -312,6 +313,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -381,31 +398,6 @@
"cuota mensual por el uso de ese servidor</a>. Debido a su vinculación con el
"
"servidor, sin él el controlador se vuelve inservible."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-"Los coches Testa tienen una <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\">puerta trasera universal remota</a>. Tesla la ha "
-"utilizado para <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-"
-"model-s-autopilot-disabled-remotely-used-car-update\">desactivar funciones "
-"del piloto automático</a> en los coches y asà hacer que sus propietarios "
-"tuvieran que desembolsar más dinero para reactivarlas."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-"Esta clase de funcionalidades maliciosas solo es posible en el software "
-"privativo. En el software libre son los usuarios quienes tienen el control, "
-"y no permitirÃan que les hicieran tales cosas."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -482,3 +474,26 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
+#~ "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
+#~ "disabled-remotely-used-car-update\"> disable the autopilot features</a> "
+#~ "on people's cars to make them pay extra for re-enabling the features."
+#~ msgstr ""
+#~ "Los coches Testa tienen una <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\">puerta trasera universal remota</a>. Tesla la ha "
+#~ "utilizado para <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-"
+#~ "model-s-autopilot-disabled-remotely-used-car-update\">desactivar "
+#~ "funciones del piloto automático</a> en los coches y asà hacer que sus "
+#~ "propietarios tuvieran que desembolsar más dinero para reactivarlas."
+
+#~ msgid ""
+#~ "This kind of malfeature is only possible with proprietary software—"
+#~ "free software is controlled by its users who wouldn't let do such things "
+#~ "to them."
+#~ msgstr ""
+#~ "Esta clase de funcionalidades maliciosas solo es posible en el software "
+#~ "privativo. En el software libre son los usuarios quienes tienen el "
+#~ "control, y no permitirÃan que les hicieran tales cosas."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.325
retrieving revision 1.326
diff -u -b -r1.325 -r1.326
--- proprietary.fr.po 26 Jun 2020 14:57:13 -0000 1.325
+++ proprietary.fr.po 26 Jun 2020 23:31:14 -0000 1.326
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-06-26 16:56+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -378,31 +395,6 @@
"l'usage de ce serveur</a>. Ã cause de l'ancrage, la centrale est "
"inutilisable sans celui-ci."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-"Les véhicules Tesla ont une <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\">porte dérobée universelle</a>. Le constructeur s'en est
"
-"servi pour <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-"
-"s-autopilot-disabled-remotely-used-car-update\">désactiver l'autopilote</a> "
-"sur des voitures achetées par des gens, afin qu'ils paient un supplément "
-"pour le réactiver."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-"Ce type de malfonction ne peut exister qu'avec du logiciel privateur. Le "
-"logiciel libre est sous le contrôle de ses utilisateurs, et ils ne se "
-"laisseraient pas traiter de la sorte."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -477,6 +469,29 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
+#~ "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
+#~ "disabled-remotely-used-car-update\"> disable the autopilot features</a> "
+#~ "on people's cars to make them pay extra for re-enabling the features."
+#~ msgstr ""
+#~ "Les véhicules Tesla ont une <a
href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\">porte dérobée universelle</a>. Le constructeur s'en "
+#~ "est servi pour <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-"
+#~ "model-s-autopilot-disabled-remotely-used-car-update\">désactiver "
+#~ "l'autopilote</a> sur des voitures achetées par des gens, afin qu'ils "
+#~ "paient un supplément pour le réactiver."
+
+#~ msgid ""
+#~ "This kind of malfeature is only possible with proprietary software—"
+#~ "free software is controlled by its users who wouldn't let do such things "
+#~ "to them."
+#~ msgstr ""
+#~ "Ce type de malfonction ne peut exister qu'avec du logiciel privateur. Le "
+#~ "logiciel libre est sous le contrôle de ses utilisateurs, et ils ne se "
+#~ "laisseraient pas traiter de la sorte."
+
+#~ msgid ""
#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.it-diff.html 25 Jun 2020 23:01:26 -0000 1.168
+++ proprietary.it-diff.html 26 Jun 2020 23:31:14 -0000 1.169
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
@@ -248,19 +261,6 @@
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
-
- <li id="M202005250">
- <p>Tesla's cars have a <a
- href="/proprietary/proprietary-back-doors.html#M201709090.1">
- universal remote back door</a>. Tesla used it to <a
-
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
- disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling the features.</p>
-
- <p>This kind of malfeature is only possible with proprietary
- software—free software is controlled by its users who wouldn't
- let do such things to them.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -323,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:26 $
+$Date: 2020/06/26 23:31:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.it.po 25 Jun 2020 23:01:26 -0000 1.206
+++ proprietary.it.po 26 Jun 2020 23:31:14 -0000 1.207
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -502,22 +518,6 @@
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.ja-diff.html 25 Jun 2020 23:01:26 -0000 1.172
+++ proprietary.ja-diff.html 26 Jun 2020 23:31:14 -0000 1.173
@@ -58,12 +58,12 @@
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
- <span class="inserted"><ins><em>color: #004caa;
+ #skiplinks a, #skiplinks a:visited {
+ color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -123,49 +123,46 @@
<tr>
<td>
<ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<ul>
-<li><strong>Type of
malware</strong></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li></em></ins></span>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ <li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
+ <li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
+ <li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
</ul>
- </td>
- <td>
+<span class="removed"><del><strong></div>
+
+<div class="malfunctions"></strong></del></span>
+ <span class="inserted"><ins><em></td>
+ <td></em></ins></span>
<ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -173,7 +170,9 @@
<td colspan="2">
<ol>
<li id="f1"><em>Back door:</em> any feature of a
program
- that enables someone who is not supposed to be in control of the
+ that enables someone who is not supposed</em></ins></span> to
+<span class="removed"><del><strong>servers</li>
+<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
@@ -186,10 +185,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -209,6 +208,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
@@ -246,19 +258,6 @@
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
-
- <li id="M202005250">
- <p>Tesla's cars have a <a
- href="/proprietary/proprietary-back-doors.html#M201709090.1">
- universal remote back door</a>. Tesla used it to <a
-
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
- disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling the features.</p>
-
- <p>This kind of malfeature is only possible with proprietary
- software—free software is controlled by its users who wouldn't
- let do such things to them.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -321,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:26 $
+$Date: 2020/06/26 23:31:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary.ja.po 25 Jun 2020 23:01:26 -0000 1.190
+++ proprietary.ja.po 26 Jun 2020 23:31:14 -0000 1.191
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -363,22 +379,6 @@
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.nl-diff.html 25 Jun 2020 23:01:27 -0000 1.169
+++ proprietary.nl-diff.html 26 Jun 2020 23:31:14 -0000 1.170
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
@@ -248,19 +261,6 @@
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
-
- <li id="M202005250">
- <p>Tesla's cars have a <a
- href="/proprietary/proprietary-back-doors.html#M201709090.1">
- universal remote back door</a>. Tesla used it to <a
-
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
- disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling the features.</p>
-
- <p>This kind of malfeature is only possible with proprietary
- software—free software is controlled by its users who wouldn't
- let do such things to them.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -323,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:27 $
+$Date: 2020/06/26 23:31:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.nl.po 25 Jun 2020 23:01:27 -0000 1.180
+++ proprietary.nl.po 26 Jun 2020 23:31:14 -0000 1.181
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -406,22 +422,6 @@
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- proprietary.pl-diff.html 25 Jun 2020 23:01:27 -0000 1.186
+++ proprietary.pl-diff.html 26 Jun 2020 23:31:14 -0000 1.187
@@ -154,17 +154,17 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -209,6 +209,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
@@ -246,19 +259,6 @@
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
-
- <li id="M202005250">
- <p>Tesla's cars have a <a
- href="/proprietary/proprietary-back-doors.html#M201709090.1">
- universal remote back door</a>. Tesla used it to <a
-
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
- disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling the features.</p>
-
- <p>This kind of malfeature is only possible with proprietary
- software—free software is controlled by its users who wouldn't
- let do such things to them.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -321,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:27 $
+$Date: 2020/06/26 23:31:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary.pl.po 25 Jun 2020 23:01:27 -0000 1.173
+++ proprietary.pl.po 26 Jun 2020 23:31:14 -0000 1.174
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -583,22 +599,6 @@
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.pot 25 Jun 2020 23:01:27 -0000 1.170
+++ proprietary.pot 26 Jun 2020 23:31:14 -0000 1.171
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a "
+"href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
"
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a "
"href=\"https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/\">snoop
"
"every second of what the user is watching</a>. This is illegal due to the "
@@ -300,23 +316,6 @@
"tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a "
-"href=\"/proprietary/proprietary-back-doors.html#M201709090.1\"> universal "
-"remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update\">
"
-"disable the autopilot features</a> on people's cars to make them pay extra "
-"for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary "
-"software—free software is controlled by its users who wouldn't let do "
-"such things to them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- proprietary.pt-br.po 25 Jun 2020 23:01:27 -0000 1.301
+++ proprietary.pt-br.po 26 Jun 2020 23:31:14 -0000 1.302
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-06-22 23:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -306,6 +306,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -367,30 +383,6 @@
"a-subscription-model.html\"> pagar uma taxa mensal pelo uso desse servidor</"
"a>. Por causa da amarração, o hub é inútil sem isso."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-"Os carros da Tesla têm uma <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> <em>back door</em> universal remota</a>. A Tesla usou-a "
-"para <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-"
-"autopilot-disabled-remotely-used-car-update\"> desativar os recursos do "
-"piloto automático</a> nos carros das pessoas para fazê-las pagar mais pela "
-"reativação dos recursos."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-"Esse tipo de falha é possÃvel apenas com software proprietário â o
software "
-"livre é controlado por seus usuários que não deixariam essas coisas com
eles."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -466,6 +458,29 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
+#~ "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
+#~ "disabled-remotely-used-car-update\"> disable the autopilot features</a> "
+#~ "on people's cars to make them pay extra for re-enabling the features."
+#~ msgstr ""
+#~ "Os carros da Tesla têm uma <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> <em>back door</em> universal remota</a>. A Tesla "
+#~ "usou-a para <a href=\"https://www.theverge.com/2020/2/6/21127243/tesla-"
+#~ "model-s-autopilot-disabled-remotely-used-car-update\"> desativar os "
+#~ "recursos do piloto automático</a> nos carros das pessoas para fazê-las "
+#~ "pagar mais pela reativação dos recursos."
+
+#~ msgid ""
+#~ "This kind of malfeature is only possible with proprietary software—"
+#~ "free software is controlled by its users who wouldn't let do such things "
+#~ "to them."
+#~ msgstr ""
+#~ "Esse tipo de falha é possÃvel apenas com software proprietário â o "
+#~ "software livre é controlado por seus usuários que não deixariam essas "
+#~ "coisas com eles."
+
+#~ msgid ""
#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.359
retrieving revision 1.360
diff -u -b -r1.359 -r1.360
--- proprietary.ru.po 26 Jun 2020 05:01:30 -0000 1.359
+++ proprietary.ru.po 26 Jun 2020 23:31:14 -0000 1.360
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -378,31 +395,6 @@
"shift-to-a-subscription-model.html\"> вноÑиÑÑ ÐµÐ¶ÐµÐ¼ÐµÑÑÑнÑÑ
плаÑÑ Ð·Ð° "
"полÑзование ÑÑим ÑеÑвеÑом</a>. Ðз-за
пÑивÑзки Ñзел без ÑÑого не ÑабоÑаеÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-"РавÑомобилÑÑ
Tesla еÑÑÑ <a
href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>.
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla "
-"полÑзовалаÑÑ Ð¸Ð¼, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.theverge.com/2020/2/6/21127243/"
-"tesla-model-s-autopilot-disabled-remotely-used-car-update\">
оÑклÑÑаÑÑ "
-"ÑÑнкÑии авÑопилоÑа</a> в авÑомобилÑÑ
и
заÑÑавлÑÑÑ Ð»Ñдей плаÑиÑÑ "
-"дополниÑелÑно за Ñо, ÑÑÐ¾Ð±Ñ Ñнова вклÑÑиÑÑ
ÑÑи ÑÑнкÑии."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-"ÐÑедоноÑнÑе ÑÑнкÑии ÑÑого Ñода могÑÑ Ð±ÑÑÑ
ÑолÑко в неÑвободнÑÑ
"
-"пÑогÑаммаÑ
— ÑвободнÑе пÑогÑаммÑ
конÑÑолиÑÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑелÑми, а "
-"они не позволÑÑ Ð²ÑÑвоÑÑÑÑ Ñ Ñобой Ñакое."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -479,6 +471,29 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
+#~ "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
+#~ "disabled-remotely-used-car-update\"> disable the autopilot features</a> "
+#~ "on people's cars to make them pay extra for re-enabling the features."
+#~ msgstr ""
+#~ "РавÑомобилÑÑ
Tesla еÑÑÑ <a
href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>.
ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla "
+#~ "полÑзовалаÑÑ Ð¸Ð¼, ÑÑÐ¾Ð±Ñ <a href=\"https://www.theverge."
+#~ "com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-"
+#~ "update\"> оÑклÑÑаÑÑ ÑÑнкÑии авÑопилоÑа</a> в
авÑомобилÑÑ
и заÑÑавлÑÑÑ "
+#~ "лÑдей плаÑиÑÑ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑно за Ñо, ÑÑобÑ
Ñнова вклÑÑиÑÑ ÑÑи ÑÑнкÑии."
+
+#~ msgid ""
+#~ "This kind of malfeature is only possible with proprietary software—"
+#~ "free software is controlled by its users who wouldn't let do such things "
+#~ "to them."
+#~ msgstr ""
+#~ "ÐÑедоноÑнÑе ÑÑнкÑии ÑÑого Ñода могÑÑ
бÑÑÑ ÑолÑко в неÑвободнÑÑ
"
+#~ "пÑогÑаммаÑ
— ÑвободнÑе пÑогÑаммÑ
конÑÑолиÑÑÑÑÑÑ "
+#~ "полÑзоваÑелÑми, а они не позволÑÑ
вÑÑвоÑÑÑÑ Ñ Ñобой Ñакое."
+
+#~ msgid ""
#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary.tr.po 26 Jun 2020 13:13:35 -0000 1.27
+++ proprietary.tr.po 26 Jun 2020 23:31:14 -0000 1.28
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-06-26 15:06+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.3\n"
@@ -305,6 +306,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -371,32 +388,6 @@
"bir ücret ödemeye</a> baÅlamalarını buyurdu. Hub, bu sunucu tasması "
"nedeniyle, sunucusuz bir iÅe yaramıyor."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-"Tesla'nın arabalarında <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\">evrensel bir uzaktan eriÅilebilen arka kapı</a> var. "
-"Tesla bu arka kapıları, arabalarında bu özellikleri tekrar
etkinleÅtirmek "
-"isteyen insanlardan daha fazla ödeme almak üzere <a href=\"https://www."
-"theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-"
-"used-car-update\">otomatik sürücü özelliklerini devre dıÅı
bırakmak</a> için "
-"kullanıyordu."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-"Bu tür bir kötücül özellikle ancak özel mülk yazılımlarla
mümkündür, özgür "
-"yazılım, böyle bir Åeyi kendilerine yapmak istemeyecek kendi
kullanıcıları "
-"tarafından denetlenir."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -477,6 +468,30 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
+#~ "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
+#~ "disabled-remotely-used-car-update\"> disable the autopilot features</a> "
+#~ "on people's cars to make them pay extra for re-enabling the features."
+#~ msgstr ""
+#~ "Tesla'nın arabalarında <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\">evrensel bir uzaktan eriÅilebilen arka kapı</a> var.
"
+#~ "Tesla bu arka kapıları, arabalarında bu özellikleri tekrar
etkinleÅtirmek "
+#~ "isteyen insanlardan daha fazla ödeme almak üzere <a href=\"https://www."
+#~ "theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-"
+#~ "used-car-update\">otomatik sürücü özelliklerini devre dıÅı
bırakmak</a> "
+#~ "için kullanıyordu."
+
+#~ msgid ""
+#~ "This kind of malfeature is only possible with proprietary software—"
+#~ "free software is controlled by its users who wouldn't let do such things "
+#~ "to them."
+#~ msgstr ""
+#~ "Bu tür bir kötücül özellikle ancak özel mülk yazılımlarla
mümkündür, "
+#~ "özgür yazılım, böyle bir Åeyi kendilerine yapmak istemeyecek kendi "
+#~ "kullanıcıları tarafından denetlenir."
+
+#~ msgid ""
#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary.zh-cn.po 26 Jun 2020 02:28:55 -0000 1.23
+++ proprietary.zh-cn.po 26 Jun 2020 23:31:14 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-06-26 10:05+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-26 23:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -288,6 +289,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -350,28 +367,6 @@
"对使ç¨æå¡å¨ä»è´¹</a>ãç±äºæ¯ç»å®çæå¡å¨ï¼æ以è¿ä¸ªå®¶åºä¸å¿æ²¡ææå¡å¨çè¯å°±å"
"å¾æ¯«æ ç¨å¤ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-"ç¹æ¯æ轿车æä¸ä¸ª <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\">å
¨å±æ§è¿ç¨åé¨</a>ãç¹æ¯æç¨å®æ¥ <a
href=\"https://www."
-"theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-"
-"used-car-update\">ç¦ç¨èªå¨é©¾é©¶åè½</a>ï¼äººä»¬éè¦é¢å¤ä»è´¹æè½å次å¯ç¨æ¤åè½ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-"è¿ç§å·®å²çåè½åªæå¨ä¸æ软件ä¸ææå¯è½——èªç±è½¯ä»¶ç±å
¶ç¨æ·æ§å¶ï¼ç¨"
-"æ·ä¸ä¼å
许è¿æ ·çåè½ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -456,6 +451,27 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
+#~ "href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
+#~ "disabled-remotely-used-car-update\"> disable the autopilot features</a> "
+#~ "on people's cars to make them pay extra for re-enabling the features."
+#~ msgstr ""
+#~ "ç¹æ¯æ轿车æä¸ä¸ª <a href=\"/proprietary/proprietary-back-doors."
+#~ "html#M201709090.1\">å
¨å±æ§è¿ç¨åé¨</a>ãç¹æ¯æç¨å®æ¥ <a
href=\"https://"
+#~ "www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-"
+#~
"remotely-used-car-update\">ç¦ç¨èªå¨é©¾é©¶åè½</a>ï¼äººä»¬éè¦é¢å¤ä»è´¹æè½å次"
+#~ "å¯ç¨æ¤åè½ã"
+
+#~ msgid ""
+#~ "This kind of malfeature is only possible with proprietary software—"
+#~ "free software is controlled by its users who wouldn't let do such things "
+#~ "to them."
+#~ msgstr ""
+#~
"è¿ç§å·®å²çåè½åªæå¨ä¸æ软件ä¸ææå¯è½——èªç±è½¯ä»¶ç±å
¶ç¨æ·æ§å¶ï¼"
+#~ "ç¨æ·ä¸ä¼å
许è¿æ ·çåè½ã"
+
+#~ msgid ""
#~ "Xiaomi phones <a href=\"https://www.forbes.com/sites/"
#~ "thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-"
#~ "xiaomi-recording-millions-of-peoples-private-web-and-phone-use/\">report "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary.zh-tw-diff.html 25 Jun 2020 23:01:27 -0000 1.149
+++ proprietary.zh-tw-diff.html 26 Jun 2020 23:31:14 -0000 1.150
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -156,14 +156,14 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202006260">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/
+ ">especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
+
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
@@ -249,19 +262,6 @@
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
-
- <li id="M202005250">
- <p>Tesla's cars have a <a
- href="/proprietary/proprietary-back-doors.html#M201709090.1">
- universal remote back door</a>. Tesla used it to <a
-
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update">
- disable the autopilot features</a> on people's cars to make them pay
- extra for re-enabling the features.</p>
-
- <p>This kind of malfeature is only possible with proprietary
- software—free software is controlled by its users who wouldn't
- let do such things to them.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -324,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/25 23:01:27 $
+$Date: 2020/06/26 23:31:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.zh-tw.po 25 Jun 2020 23:01:27 -0000 1.160
+++ proprietary.zh-tw.po 26 Jun 2020 23:31:14 -0000 1.161
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-25 22:55+0000\n"
+"POT-Creation-Date: 2020-06-26 23:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"TV manufacturers are able to <a href=\"https://www.zdnet.com/article/fbi-"
"warns-about-snoopy-smart-tvs-spying-on-you/\">snoop every second of what the "
"user is watching</a>. This is illegal due to the Video Privacy Protection "
@@ -476,22 +492,6 @@
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tesla's cars have a <a href=\"/proprietary/proprietary-back-doors."
-"html#M201709090.1\"> universal remote back door</a>. Tesla used it to <a "
-"href=\"https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-"
-"disabled-remotely-used-car-update\"> disable the autopilot features</a> on "
-"people's cars to make them pay extra for re-enabling the features."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This kind of malfeature is only possible with proprietary software—"
-"free software is controlled by its users who wouldn't let do such things to "
-"them."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- pt-br.po 25 Jun 2020 23:01:27 -0000 1.249
+++ pt-br.po 26 Jun 2020 23:31:14 -0000 1.250
@@ -5576,6 +5576,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.414
retrieving revision 1.415
diff -u -b -r1.414 -r1.415
--- ru.po 26 Jun 2020 04:51:01 -0000 1.414
+++ ru.po 26 Jun 2020 23:31:14 -0000 1.415
@@ -2128,10 +2128,10 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
"ÐÑоизводиÑели ÑелевизоÑов могÑÑ <a
href=\"https://www.zdnet.com/article/fbi-"
-"warns-about-snoopy-smart-tvs-spying-on-you/\">каждÑÑ ÑекÑндÑ
подглÑдÑваÑÑ "
-"за Ñем, ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑ</a>.
ÐÐºÑ 1988 года “РзаÑиÑе ÑаÑÑной жизни "
-"в оÑноÑении видео” Ð´ÐµÐ»Ð°ÐµÑ ÑÑо
незаконнÑм, но они обÑ
одÑÑ ÑÑо Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ "
-"ÑоглаÑений Ñ Ð¿Ð¾Ð»ÑзоваÑелем."
+"warns-about-snoopy-smart-tvs-spying-on-you/\">каждÑÑ ÑекÑндÑ
подглÑдÑваÑÑ Ð·Ð° "
+"Ñем, ÑÑо пÑоÑмаÑÑÐ¸Ð²Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑ</a>.
ÐÐºÑ 1988 года “РзаÑиÑе "
+"ÑаÑÑной жизни в оÑноÑении видео”
Ð´ÐµÐ»Ð°ÐµÑ ÑÑо незаконнÑм, но они обÑ
одÑÑ "
+"ÑÑо Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑоглаÑений Ñ Ð¿Ð¾Ð»ÑзоваÑелем."
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -6899,6 +6899,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- tr.po 26 Jun 2020 13:30:22 -0000 1.21
+++ tr.po 26 Jun 2020 23:31:14 -0000 1.22
@@ -4838,6 +4838,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- zh-cn.po 26 Jun 2020 02:28:55 -0000 1.18
+++ zh-cn.po 26 Jun 2020 23:31:14 -0000 1.19
@@ -4776,6 +4776,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- zh-tw.po 25 Jun 2020 23:01:27 -0000 1.187
+++ zh-tw.po 26 Jun 2020 23:31:14 -0000 1.188
@@ -4857,6 +4857,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Most apps are malware, but Trump's campaign app, like Modi's campaign app, "
+"is <a href=\"https://www.technologyreview.com/2020/06/21/1004228/trumps-data-"
+"hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "
+"\">especially nasty malware, helping companies snoop on users as well as "
+"snooping on them itself</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article says that Biden's app has a less manipulative overall approach, "
+"but that does not tell us whether it has functionalities we consider "
+"malicious, such as sending data the user has not explicitly asked to send."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Xiaomi phones <a href=\"https://www.forbes.com/sites/"
"thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-"
"recording-millions-of-peoples-private-web-and-phone-use/\">report many "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/25
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/29
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/29