[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 9 Jul 2020 04:02:19 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/07/09 04:02:18
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.es.po malware-cars.fr.po
malware-cars.pot malware-cars.ru.po nl.po pl.po
pot proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.es.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.510&r2=1.511
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.324&r2=1.325
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.606&r2=1.607
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.422&r2=1.423
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.191&r2=1.192
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- de.po 1 Jul 2020 14:02:13 -0000 1.191
+++ de.po 9 Jul 2020 08:02:16 -0000 1.192
@@ -4567,6 +4567,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -12060,6 +12067,23 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- es.po 3 Jul 2020 10:00:43 -0000 1.276
+++ es.po 9 Jul 2020 08:02:16 -0000 1.277
@@ -4101,6 +4101,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -11824,6 +11831,23 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- fr.po 1 Jul 2020 16:13:45 -0000 1.336
+++ fr.po 9 Jul 2020 08:02:16 -0000 1.337
@@ -3720,6 +3720,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -10493,6 +10500,23 @@
msgid "Latest additions"
msgstr "Ajouts récents"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- it.po 1 Jul 2020 14:02:13 -0000 1.191
+++ it.po 9 Jul 2020 08:02:16 -0000 1.192
@@ -4318,6 +4318,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -11329,6 +11336,23 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- ja.po 1 Jul 2020 14:02:13 -0000 1.199
+++ ja.po 9 Jul 2020 08:02:16 -0000 1.200
@@ -3257,6 +3257,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -8806,6 +8813,23 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- malware-cars.de-diff.html 24 Jun 2020 05:37:09 -0000 1.36
+++ malware-cars.de-diff.html 9 Jul 2020 08:02:16 -0000 1.37
@@ -51,73 +51,110 @@
<div id="last-div" class="reduced-width"></em></ins></span>
<h2>Malware In Cars</h2>
-<span class="removed"><del><strong><p><a
href="/proprietary/proprietary.html">Other examples</strong></del></span>
+<span class="removed"><del><strong><p><a
href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
+
+<p>Here are examples of</strong></del></span>
<span class="inserted"><ins><em><div class="infobox">
<hr class="full-width" />
-<p>Nonfree (proprietary) software is very often malware (designed to
+<p>Nonfree (proprietary) software is very often</em></ins></span>
malware <span class="inserted"><ins><em>(designed to
mistreat the user). Nonfree software is controlled by its developers,
-which puts them in a position of power over the users; <a
+which puts them</em></ins></span> in <span
class="removed"><del><strong>cars.</p>
+
+<ul>
+<li>
+<p>Tesla used</strong></del></span> a <span
class="removed"><del><strong>universal backdoor in its software to limit
customers to
+using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
+part</strong></del></span> <span
class="inserted"><ins><em>position</em></ins></span> of <span
class="inserted"><ins><em>power over</em></ins></span> the <span
class="removed"><del><strong>battery of some cars</a>.</p>
+
+<p>While remotely allowing car
“owners”</strong></del></span> <span
class="inserted"><ins><em>users; <a
href="/philosophy/free-software-even-more-important.html">that is the
basic injustice</a>. The developers and manufacturers often exercise
-that power to the detriment of the users they ought to serve.</p>
+that power</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> the <span
class="removed"><del><strong>whole battery
+capacity did not do them any harm,</strong></del></span> <span
class="inserted"><ins><em>detriment of</em></ins></span> the <span
class="removed"><del><strong>same back door would permit
+Tesla (perhaps under</strong></del></span> <span
class="inserted"><ins><em>users they ought to serve.</p>
-<p>This typically takes the form of malicious functionalities.</p>
+<p>This typically takes</em></ins></span> the <span
class="removed"><del><strong>command</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="removed"><del><strong>some government)</strong></del></span> <span
class="inserted"><ins><em>malicious functionalities.</p>
<hr class="full-width" />
</div>
<div class="article">
<div class="important">
-<p>If you know of an example that ought to be in this page but isn't
-here, please write
-to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p>
+<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>remotely order
+the car</strong></del></span> <span class="inserted"><ins><em>be in this page
but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>use none of its battery. Or
perhaps</strong></del></span> <span class="inserted"><ins><em><a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a></em></ins></span>
+to <span class="removed"><del><strong>drive its
passenger</strong></del></span> <span class="inserted"><ins><em>inform us.
Please include the URL of a trustworthy reference or two</em></ins></span>
+to <span class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
- <li id="M201912171">
- <p>Most modern cars now <a
-
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds</em></ins></span> of <span
class="inserted"><ins><em>data to the manufacturer</a>. For
- the user, access to the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden and running with
- proprietary software.</p>
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a>
through</em></ins></span> a <span class="removed"><del><strong>torture
prison.</p></strong></del></span> <span
class="inserted"><ins><em>universal
+ back door.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912171">
+ <p>Most modern cars now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
+Audi's proprietary software used a simple method</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data</em></ins></span> to <span
class="removed"><del><strong>cheat on emissions
+tests</a>:</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. For
+ the user, access</em></ins></span> to <span
class="removed"><del><strong>activate a special low-emission gearshifting mode
until</strong></del></span> the
+<span class="removed"><del><strong>first time</strong></del></span> <span
class="inserted"><ins><em>data is nearly impossible, as it involves
+ cracking</em></ins></span> the <span class="removed"><del><strong>car made
a turn.
+</li>
+
+<li>
+<p>Caterpillar vehicles come</strong></del></span> <span
class="inserted"><ins><em>car's computer, which is always hidden and
running</em></ins></span> with <span
class="removed"><del><strong>a</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
</li>
<li id="M201909160">
- <p>Tesla users claim Tesla <a
-
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
- software to cut down on battery range</a>, rather than replace the
- defective batteries. Tesla did this to avoid having to run their
+ <p>Tesla users claim Tesla</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+back-door</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
+ software</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>cut down on battery range</a>, rather than
replace</em></ins></span> the <span
class="removed"><del><strong>engine</a>
remotely.</p></strong></del></span>
+ <span class="inserted"><ins><em>defective batteries. Tesla did this to
avoid having to run their
warranty.</p>
- <p>This means that</em></ins></span> proprietary <span
class="removed"><del><strong>malware</a></p>
-
-<p>Here</strong></del></span> <span class="inserted"><ins><em>software
can potentially be a way to
- commit perjury with impunity.</p>
+ <p>This means that proprietary software can potentially be a way to
+ commit perjury with impunity.</p></em></ins></span>
</li>
- <li id="M201904150">
- <p id="M201509210">Volkswagen programmed its car engine computers to
<a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+<span class="removed"><del><strong><li>
+<p><a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+Volkswagen</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904150">
+ <p id="M201509210">Volkswagen</em></ins></span> programmed its car
engine computers to <span class="inserted"><ins><em><a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"></em></ins></span>
detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of the time. In real driving, the cars exceeded
+ run dirty the rest of the <span
class="removed"><del><strong>time.</p>
+
+<p>In</strong></del></span> <span class="inserted"><ins><em>time.
In</em></ins></span> real driving, the cars exceeded
emissions standards by a factor of up to 35.</p>
<p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
+ programming it this way, but would have made <span
class="removed"><del><strong>it harder</strong></del></span> <span
class="inserted"><ins><em>it harder to conceal,
and given the users the possibility of correcting the deception.</p>
- <p>Former executives of Volkswagen</em></ins></span> are <span
class="removed"><del><strong>examples</strong></del></span> <span
class="inserted"><ins><em>being <a
+ <p>Former executives of Volkswagen are being <a
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots</em></ins></span> of <span
class="removed"><del><strong>malware</strong></del></span> <span
class="inserted"><ins><em>personal data, and <a
+ <p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
when they go to a junkyard the driver's personal data goes with
them</a>.</p>
@@ -131,11 +168,7 @@
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you
succeeded</em></ins></span> in <span
class="removed"><del><strong>cars.</p>
-
-<ul>
-<li>
-<p>Tesla used</strong></del></span> <span
class="inserted"><ins><em>breaking the
+ <p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
@@ -143,7 +176,7 @@
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of</em></ins></span> a universal <span
class="removed"><del><strong>backdoor</strong></del></span> <span
class="inserted"><ins><em>back door</a>.</p>
+ offer the feature of a universal back door</a>.</p>
<p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
@@ -164,26 +197,25 @@
<li id="M201810230">
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a></em></ins></span> in its
<span class="removed"><del><strong>software</strong></del></span>
- <span class="inserted"><ins><em>“connected” cars, minute by
minute.</p>
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
<p>GM did not get users' consent, but it could have got that easily
by
sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>limit
customers</strong></del></span> <span class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want</em></ins></span> to
-<span class="removed"><del><strong>using just</strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
+ <p>But if you really want to be safe, we must make sure the car's
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
<li id="M201711230">
- <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
</li>
@@ -194,11 +226,11 @@
</li>
<li id="M201709090.1">
- <p>Tesla used software to limit the</em></ins></span> part of the
battery <span class="removed"><del><strong>of</strong></del></span>
- <span class="inserted"><ins><em>that was available to customers
in</em></ins></span> some <span
class="removed"><del><strong>cars</a>.</p></strong></del></span>
<span class="inserted"><ins><em>cars, and <a
+ <p>Tesla used software to limit the part of the battery
+ that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
- this limit.</p></em></ins></span>
+ this limit.</p>
<p>While remotely allowing car “owners” to use the
whole battery capacity did not do them any harm, the same back
@@ -207,11 +239,9 @@
perhaps to drive its passenger to a torture prison.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702170">
- <p>The mobile apps for communicating</em></ins></span> <a
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+ <li id="M201702170">
+ <p>The mobile apps for communicating <a
+
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
<p>This is in addition to the fact that the car contains a cellular
@@ -221,31 +251,11 @@
</li>
<li id="M201611060">
- <p><a</em></ins></span>
+ <p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
tests</a>: to activate a special low-emission gearshifting mode until
- the first time <span class="removed"><del><strong>the car made a turn.
-</li>
-
-<li>
-<p>Caterpillar vehicles come with a <a
-href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
-back-door to shutoff the engine</a> remotely.</p>
-</li>
-
-<li>
-<p><a
-href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
-Volkswagen programmed its car engine computers to detect the
-Environmental Protection Agency's emission tests</a>,
-and run dirty the rest of the time.</p>
-
-<p>In real driving, the cars exceeded emissions standards by a factor
-of up to 35.</p>
-
-<p>Using free software would not have stopped Volkswagen from
-programming it this way, but would have</strong></del></span> <span
class="inserted"><ins><em>the car</em></ins></span> made <span
class="removed"><del><strong>it harder</strong></del></span> <span
class="inserted"><ins><em>a turn.</p>
+ the first time the car made a turn.</p>
</li>
<li id="M201608110">
@@ -451,7 +461,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:09 $
+$Date: 2020/07/09 08:02:16 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-cars.de.po 24 Jun 2020 05:37:09 -0000 1.26
+++ malware-cars.de.po 9 Jul 2020 08:02:16 -0000 1.27
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -146,6 +146,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
Index: malware-cars.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.es.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-cars.es.po 24 Jun 2020 05:37:09 -0000 1.8
+++ malware-cars.es.po 9 Jul 2020 08:02:16 -0000 1.9
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-02-17 12:01+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -95,6 +96,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-cars.fr.po 24 Jun 2020 05:02:40 -0000 1.41
+++ malware-cars.fr.po 9 Jul 2020 08:02:16 -0000 1.42
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-02-15 17:39+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -90,6 +91,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-cars.pot 24 Jun 2020 05:37:09 -0000 1.20
+++ malware-cars.pot 9 Jul 2020 08:02:16 -0000 1.21
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a "
+"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\"> "
+"enable and disable functionality in cars</a> through a universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a "
"href=\"https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html\"> "
"record and send various kinds of data to the manufacturer</a>. For the user, "
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- malware-cars.ru.po 24 Jun 2020 05:04:03 -0000 1.48
+++ malware-cars.ru.po 9 Jul 2020 08:02:16 -0000 1.49
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:30+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -93,6 +94,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- nl.po 1 Jul 2020 14:02:13 -0000 1.192
+++ nl.po 9 Jul 2020 08:02:16 -0000 1.193
@@ -3136,6 +3136,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -8173,6 +8180,23 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- pl.po 1 Jul 2020 14:02:13 -0000 1.191
+++ pl.po 9 Jul 2020 08:02:16 -0000 1.192
@@ -2709,6 +2709,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7671,6 +7678,23 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- pot 1 Jul 2020 14:02:13 -0000 1.190
+++ pot 9 Jul 2020 08:02:16 -0000 1.191
@@ -2493,6 +2493,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -6999,6 +7006,23 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#
#
#
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary-back-doors.de-diff.html 24 Jun 2020 05:37:10 -0000 1.41
+++ proprietary-back-doors.de-diff.html 9 Jul 2020 08:02:16 -0000 1.42
@@ -463,32 +463,21 @@
tricks.</p>
<p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point is that nobody should have such power,
+ malicious so far, the point is <span class="removed"><del><strong>that
nobody should have such power,
+ which could also be used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em>that nobody should
have such power,
which could also be used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for <span
class="removed"><del><strong>allowing it
- to <em>delete</em> the programs, and you should have the
right to
- decide who (if anyone) to trust in this way.</p>
+ it considers malicious. But there is no excuse for allowing it to
+ <em>delete</em> the programs, and you should have the right to
decide
+ who (if anyone) to trust in this way.</p>
</li>
- <li>
- <p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
- Windows 8 also has a back door for remotely deleting
apps</a>.</p>
- <p>You might well decide to let a security service that you trust
- remotely <em>deactivate</em> programs that it considers
malicious.
- But there is no excuse for
<em>deleting</em></strong></del></span> <span
class="inserted"><ins><em>allowing it to
- <em>delete</em></em></ins></span> the programs, and you should
have the right to decide <span
class="removed"><del><strong>whom</strong></del></span>
- <span class="inserted"><ins><em>who</em></ins></span> (if anyone) to trust
in this way.</p>
- </li>
-
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
+ <li id="M200808110">
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
- this power because of <span class="removed"><del><strong>course we can
trust Apple.</p></strong></del></span> <span
class="inserted"><ins><em>course we can trust Apple.</p>
+ this power because of course we can trust Apple.</p>
</li>
</ul>
@@ -496,6 +485,13 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
<li id="M202004130">
<p>The <a
href="https://www.google.com/mobile/android/market-tos.html">
Google Play Terms of Service</a> insist that the user of Android
accept
@@ -516,21 +512,24 @@
<p>The adware is in a modified version of an
essential system configuration app. The back door is a
- surreptitious addition to a program whose stated purpose is to be a <a
+ surreptitious addition</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> a
+ <span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
+ considers malicious. But there</strong></del></span> <span
class="inserted"><ins><em>program whose stated purpose</em></ins></span> is
<span class="removed"><del><strong>no excuse</strong></del></span> <span
class="inserted"><ins><em>to be a <a
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
- universal back door for firmware</a>.</p>
+ universal back door</em></ins></span> for <span
class="removed"><del><strong>allowing it</strong></del></span> <span
class="inserted"><ins><em>firmware</a>.</p>
<p>In other words, a program whose raison d'être is malicious has
- a secret secondary malicious purpose. All this is in addition to the
- malware of Android itself.</p>
+ a secret secondary malicious purpose. All this is in
addition</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
the <span class="removed"><del><strong>programs, and you should
have</strong></del></span>
+ <span class="inserted"><ins><em>malware of Android itself.</p>
</li>
<li id="M201910130.1">
<p>The Chinese Communist Party's <a
href="/proprietary/proprietary-surveillance.html#M201910130">
- “Study the Great Nation” app</a> was found to contain
<a
+ “Study</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>Great Nation” app</a> was
found</em></ins></span> to
+ <span class="removed"><del><strong>decide who (if
anyone)</strong></del></span> <span class="inserted"><ins><em>contain <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- a back-door allowing developers to run any code they wish</a> in the
+ a back-door allowing developers</em></ins></span> to <span
class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>run any code they wish</a></em></ins></span> in
<span class="removed"><del><strong>this way.</p></strong></del></span>
<span class="inserted"><ins><em>the
users' phone, as “superusers.”</p>
<p>Note: The <a
@@ -540,29 +539,44 @@
saying that the tests were only performed on the Android version
of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
+ Apple's operating system.”</p></em></ins></span>
</li>
- <li id="M201908220">
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ Windows 8 also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
- ChromeOS has a universal back door that is used for updates and <a
+ ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="inserted"><ins><em>that is used</em></ins></span> for <span
class="removed"><del><strong>remotely deleting apps</a>.</p>
+ <p>You might well decide</strong></del></span> <span
class="inserted"><ins><em>updates and <a
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
- ceases to operate at a predefined date</a>. From then on, there
- appears to be no support whatsoever for the computer.</p>
+ ceases</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>operate at</em></ins></span> a <span
class="removed"><del><strong>security service that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But</strong></del></span> <span class="inserted"><ins><em>predefined
date</a>. From then on,</em></ins></span> there <span
class="removed"><del><strong>is</strong></del></span>
+ <span class="inserted"><ins><em>appears to be</em></ins></span> no <span
class="removed"><del><strong>excuse</strong></del></span> <span
class="inserted"><ins><em>support whatsoever</em></ins></span> for <span
class="removed"><del><strong><em>deleting</em></strong></del></span>
the <span class="removed"><del><strong>programs, and</strong></del></span>
<span class="inserted"><ins><em>computer.</p>
- <p>In other words, when you stop getting screwed by the back door,
- you start getting screwed by the obsolescence.</p>
+ <p>In other words, when</em></ins></span> you
+ <span class="removed"><del><strong>should have</strong></del></span>
<span class="inserted"><ins><em>stop getting screwed by</em></ins></span> the
<span class="removed"><del><strong>right to decide whom (if anyone) to trust in
this
+ way.</p></strong></del></span> <span
class="inserted"><ins><em>back door,
+ you start getting screwed by the obsolescence.</p></em></ins></span>
</li>
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>a back
door</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+ “inappropriate”. Jobs said it's OK for
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>have this
+ power because</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in breaking the
+ <p>If you own one</em></ins></span> of <span
class="removed"><del><strong>course we can trust
Apple.</p></strong></del></span> <span class="inserted"><ins><em>these
cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p></em></ins></span>
</li>
@@ -930,7 +944,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/07/09 08:02:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-back-doors.de.po 24 Jun 2020 05:37:10 -0000 1.139
+++ proprietary-back-doors.de.po 9 Jul 2020 08:02:16 -0000 1.140
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -843,6 +843,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-back-doors.es.po 24 Jun 2020 05:37:10 -0000 1.36
+++ proprietary-back-doors.es.po 9 Jul 2020 08:02:16 -0000 1.37
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-04-14 11:18+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -696,6 +697,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-back-doors.fr.po 24 Jun 2020 05:02:40 -0000 1.155
+++ proprietary-back-doors.fr.po 9 Jul 2020 08:02:16 -0000 1.156
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-04-14 10:17+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -701,6 +702,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-back-doors.it-diff.html 24 Jun 2020 05:37:10 -0000 1.67
+++ proprietary-back-doors.it-diff.html 9 Jul 2020 08:02:16 -0000 1.68
@@ -570,6 +570,13 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
<li id="M202004130">
<p>The <a
href="https://www.google.com/mobile/android/market-tos.html">
Google Play Terms of Service</a> insist that the user of Android
accept
@@ -971,7 +978,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:10 $
+$Date: 2020/07/09 08:02:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary-back-doors.it.po 24 Jun 2020 05:37:11 -0000 1.131
+++ proprietary-back-doors.it.po 9 Jul 2020 08:02:16 -0000 1.132
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -858,6 +858,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary-back-doors.ja-diff.html 24 Jun 2020 05:37:11 -0000 1.67
+++ proprietary-back-doors.ja-diff.html 9 Jul 2020 08:02:16 -0000 1.68
@@ -437,26 +437,32 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M202004130">
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor</strong></del></span> <span
class="inserted"><ins><em>href="https://www.google.com/mobile/android/market-tos.html">
+ <li id="M202007010">
+ <p>BMW will remotely</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality</em></ins></span> in <span
class="removed"><del><strong>the
backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>cars</a> through a universal
+ back door.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Caterpillar vehicles
come with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202004130">
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span
class="inserted"><ins><em>href="https://www.google.com/mobile/android/market-tos.html">
Google Play Terms of Service</a> insist that the user of Android
accept
the presence of universal back doors in apps released by Google.</p>
<p>This does not tell us whether any of Google's apps currently
contains a universal back door, but that is a secondary question.
- In moral terms, demanding that people accept</em></ins></span> in <span
class="inserted"><ins><em>advance certain bad
- treatment is equivalent to actually doing it. Whatever condemnation
- the latter deserves,</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>former deserves the
same.</p></em></ins></span>
+ In moral terms, demanding that people accept in advance certain bad
+ treatment is equivalent</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>actually doing it. Whatever
condemnation</em></ins></span>
+ the <span class="removed"><del><strong>engine</a>
+ remotely.</p></strong></del></span> <span
class="inserted"><ins><em>latter deserves, the former deserves the
same.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Caterpillar
vehicles</strong></del></span>
+<span class="removed"><del><strong><li><p>
+Mac OS X had an</strong></del></span>
<span class="inserted"><ins><em><li id="M202001090">
- <p>Android phones subsidized by the US government</em></ins></span>
come with <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
- remotely.</p>
- </li>
-<li><p>
-Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ <p>Android phones subsidized by the US government come
with</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
preinstalled adware and a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
@@ -959,7 +965,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/24 05:37:11 $
+$Date: 2020/07/09 08:02:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-back-doors.ja.po 24 Jun 2020 05:37:11 -0000 1.115
+++ proprietary-back-doors.ja.po 9 Jul 2020 08:02:16 -0000 1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -665,6 +665,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary-back-doors.pot 24 Jun 2020 05:37:11 -0000 1.80
+++ proprietary-back-doors.pot 9 Jul 2020 08:02:16 -0000 1.81
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-06-24 05:26+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -491,6 +491,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a "
+"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\"> "
+"enable and disable functionality in cars</a> through a universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-back-doors.ru.po 24 Jun 2020 05:04:03 -0000 1.204
+++ proprietary-back-doors.ru.po 9 Jul 2020 08:02:16 -0000 1.205
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-20 10:31+0200\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -688,6 +689,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The <a href=\"https://www.google.com/mobile/android/market-tos.html\"> "
"Google Play Terms of Service</a> insist that the user of Android accept the "
"presence of universal back doors in apps released by Google."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-surveillance.de-diff.html 26 Jun 2020 23:31:13 -0000
1.115
+++ proprietary-surveillance.de-diff.html 9 Jul 2020 08:02:16 -0000
1.116
@@ -981,185 +981,97 @@
<span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
<span class="inserted"><ins><em><li id="M201811230">
- <p>An</em></ins></span> Android <span
class="removed"><del><strong>apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span class="inserted"><ins><em>phone was
observed</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>track location even while
+ <p>An</em></ins></span> Android <span
class="removed"><del><strong>apps (but not</strong></del></span> <span
class="inserted"><ins><em>phone was observed to track location even while
in airplane mode. It didn't send the location data while in
- airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span>
+ airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
+ it saved up the data, and sent them all later</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711210">
+ <li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even</em></ins></span> when <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>“location services”</em></ins></span> are
<span class="removed"><del><strong>sold.
- Some Motorola</strong></del></span> <span
class="inserted"><ins><em>turned off, even when
+ even when “location services” are turned off, even when
the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140">
- <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
+ <li id="M201609140">
+ <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>completely stop</em></ins></span> the <span
class="removed"><del><strong>system.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>tracking. This is
- yet another example of nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA and</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because
this</strong></del></span> <span class="inserted"><ins><em>user,
- when it's actually doing something else. Such a thing</em></ins></span>
would <span class="removed"><del><strong>require circumventing the iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>be almost
- unthinkable with free software.</p></em></ins></span>
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>location
tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p>
</li>
- <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
- obvious way</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense</em></ins></span> for <span
class="removed"><del><strong>you—“We know you
want</strong></del></span> <span class="inserted"><ins><em>users. Said
transmission,
+ transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
of some kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>any
file on the system.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308010">
+ <li id="M201308010">
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in
Android phones
- and laptops</a> (presumably Windows laptops).
Here</em></ins></span> is <span class="removed"><del><strong>snooping on
- them.</p></li>
-
- <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a> (presumably Windows laptops). Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version</em></ins></span> of <span
class="inserted"><ins><em>Android that <a
+ by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ sends personal data to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307250">
- <p>A Motorola</em></ins></span> phone <span
class="removed"><del><strong>number that the user types into it</a>; the
server records these numbers</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201307250">
+ <p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</em></ins></span> for <span class="removed"><del><strong>at least
30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>voice all the
time</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>personal details</em></ins></span> of <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third parties.</p>
+ listens for voice all the time</a>.</p>
</li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>is not enough</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>“Terms</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>Conditions” that spell out
what</em></ins></span>
- they <span class="removed"><del><strong>make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make</strong></del></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span
class="inserted"><ins><em>“consenting” to. Google should clearly
and
- honestly identify</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>still counts as a
- surveillance functionality.</p>
+ <li id="M201302150">
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>collects on users, instead</em></ins></span> of
<span class="removed"><del><strong>this</strong></del></span>
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
-
- <p>However,</em></ins></span> to <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ <p>However, to truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA</strong></del></span>
- <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
@@ -1172,135 +1084,65 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="removed"><del><strong>access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span class="inserted"><ins><em>contain JavaScript
code,</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p>
- </li>
-
- <li><p>There is also a feature for web sites to track users,
which is</strong></del></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used</em></ins></span> by <span
class="removed"><del><strong>default, though that can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>most US libraries,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</em></ins></span> data <span
class="removed"><del><strong>from iPhones for the
state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>an iThing,
- or it is totally incompetent.</a></p>
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at what
time</a>.</p></em></ins></span>
+ <li id="M201212030">
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
-<div <span class="inserted"><ins><em>class="big-section">
+<div class="big-section">
<h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
-<div</em></ins></span> class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is
pervasive</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location</strong></del></span> <span
class="inserted"><ins><em>AVG extensions</em></ins></span>
- for <span class="removed"><del><strong>Google</strong></del></span> <span
class="inserted"><ins><em>Firefox and Chrome were found to</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li>
-
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden text messages which enable them to turn the
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop</em></ins></span> on <span class="removed"><del><strong>and off,
listen to the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and
web</strong></del></span> <span class="inserted"><ins><em>users'
detailed</em></ins></span> browsing <span
class="removed"><del><strong>history,</strong></del></span> <span
class="inserted"><ins><em>habits</a>. Mozilla</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>Google
- removed</em></ins></span> the <span class="removed"><del><strong>contact
list. This malware is designed</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
- once more how unsafe nonfree software can be. Tools that are
supposed</em></ins></span>
- to
- <span class="removed"><del><strong>disguise</strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
- additional malware (the system</em></ins></span> itself <span
class="removed"><del><strong>from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>being the original
malware).</p></em></ins></span>
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original
malware).</p>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact</em></ins></span> that <span
class="removed"><del><strong>users can't delete</a>,
- and they send so much data</strong></del></span> <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
+ <p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="inserted"><ins><em>not</em></ins></span> a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span class="inserted"><ins><em>nonfree
software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1310,37 +1152,26 @@
<ul class="blurbs">
<li id="M202003010">
<p>The Alipay Health Code app
- estimates whether</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells the cops directly</a>.</p></em></ins></span>
+ estimates whether the user has Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202001290">
- <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
+ <li id="M202001290">
+ <p>The Amazon Ring app does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912220">
+ <li id="M201912220">
<p>The ToToc messaging app seems to be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
spying tool for the government of the United Arab Emirates</a>.
- Any</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat
app's principal purpose</strong></del></span> <span
class="inserted"><ins><em>program could be doing this, and
that</em></ins></span> is <span class="inserted"><ins><em>a good
- reason</em></ins></span> to <span class="removed"><del><strong>restrict
- the</strong></del></span> use <span class="inserted"><ins><em>free
software instead.</p>
+ Any nonfree program could be doing this, and that is a good
+ reason to use free software instead.</p>
<p><small>Note: this article uses the word “free”
in
- the sense</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
+ the sense of “gratis.”</small></p>
</li>
<li id="M201912090">
@@ -1348,276 +1179,146 @@
when used for work, give employers powerful <a
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span> <span class="inserted"><ins><em>device.
Many employers demand</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>user's list of</strong></del></span>
- <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
- and as dangerous as any</em></ins></span> other <span
class="removed"><del><strong>people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>nonfree software.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910130"></em></ins></span>
- <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's “Study
- the Great Nation”</em></ins></span> app <span
class="removed"><del><strong>and dis-service spy on users even more
than</strong></del></span> <span
class="inserted"><ins><em>requires</em></ins></span> users
- <span class="removed"><del><strong>expected. It</strong></del></span>
<span class="inserted"><ins><em>to grant it</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages,
contacts,</em></ins></span> and <span class="removed"><del><strong>after
going</strong></del></span>
- <span class="inserted"><ins><em>internet history</a>, and the
Android version was found</em></ins></span> to <span
class="inserted"><ins><em>contain</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
+ </li>
+
+ <li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.” Downloading and using this
+ app is mandatory at some workplaces.</p>
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
- </li>
-
- <li><p>The Sarahah</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish in the users'
- phone, as “superusers.” Downloading and using
this</em></ins></span>
- app <span class="inserted"><ins><em>is mandatory at some
workplaces.</p>
-
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email
addresses</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting</em></ins></span> in <span
class="removed"><del><strong>user's address
- book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>a text editor) includes a clarification
- saying</em></ins></span> that <span class="removed"><del><strong>this
article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
-
- <li>
- <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>tests were only
performed</em></ins></span> on <span class="removed"><del><strong>what people
are listening</strong></del></span> <span class="inserted"><ins><em>the Android
version
- of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In addition, it
may</strong></del></span> <span class="inserted"><ins><em>Apple, “this
kind of
- ‘superuser’ surveillance could not</em></ins></span> be <span
class="removed"><del><strong>analyzing people's conversations to serve them
with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>conducted on
- Apple's operating system.”</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909091">
- <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when</em></ins></span> it <span
class="removed"><del><strong>demands to personal data in</strong></del></span>
<span class="inserted"><ins><em>is turned off</a>, after tricking them
- into giving</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</strong></del></span> app <span
class="removed"><del><strong>that it will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order to use
one</em></ins></span> of its <span class="removed"><del><strong>phones. The app
will give Verizon the same
- information about the</strong></del></span>
- <span class="inserted"><ins><em>functionalities.</p>
+ <li id="M201909091">
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
+ functionalities.</p>
</li>
<li id="M201909090">
<p>Some nonfree period-tracking apps including MIA Fem and Maya <a
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of</em></ins></span> users' <span
class="removed"><del><strong>searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>lives to Facebook</a>.</p>
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There</em></ins></span> is <span
class="inserted"><ins><em>a
- proprietary program for adjusting a certain telescopic rifle
sight.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>list of all</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not be a list</em></ins></span>
of <span class="removed"><del><strong>spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>who has installed
- it.</p></em></ins></span>
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>a Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features</em></ins></span>
- of <span class="removed"><del><strong>data in</strong></del></span> the
<span class="removed"><del><strong>phone, and</strong></del></span> <span
class="inserted"><ins><em>operating system,</em></ins></span> in <span
class="removed"><del><strong>server accounts, it</strong></del></span> <span
class="inserted"><ins><em>order to gather as much private data as
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
- <p>Thus, we can't trust rules against spying. What
we</em></ins></span> can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'</strong></del></span>
<span class="inserted"><ins><em>trust is
+ <p>Thus, we can't trust rules against spying. What we can trust is
having control over the software we run.</p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users'</em></ins></span> movements <span
class="removed"><del><strong>before and after</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user says <a
+ users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to
locations</a>.</p></em></ins></span>
+ not to allow them access to locations</a>.</p>
- <p>This <span class="removed"><del><strong>example illustrates how
“getting the user's consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>involves an apparently unintentional weakness in
Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <li id="M201905300">
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ programs.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
requirement to run a proprietary phone app</a> to be allowed into
the event.</p>
- <p>This app is a spyware that can</em></ins></span> snoop on <span
class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>contact list,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p>
- </li>
-
- <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>has</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
- <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>picture you
take according to who</strong></del></span>
- <span class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>in the frame.</p>
-
- <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>“anonymized
and aggregated,” it can easily be
- traced back</em></ins></span> to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app.</p>
-
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
- and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
- these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
- spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>you is
available from</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows the</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
- a <span class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>movements</em></ins></span> of <span
class="inserted"><ins><em>Android phones and iPhones
+ <p>Google tracks the movements of Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
- optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible</em></ins></span> for
<span class="removed"><del><strong>children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>sending
- the location data to Google.</p></em></ins></span>
- </li>
+ saves the data for years</a>.</p>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree</em></ins></span> apps <span
class="removed"><del><strong>snoop on the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>that have
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data
without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>snooping done
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to
user-installed apps that have access to</em></ins></span>
- the <span class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>network but no direct
access to</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>data. This results</em></ins></span> in <span
class="inserted"><ins><em>massive
- surveillance on which</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get
- users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>control.</p></em></ins></span>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which
can</em></ins></span> use <span class="removed"><del><strong>by
companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> it
<span class="removed"><del><strong>asked the</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
+ </li>
+
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever</em></ins></span> user <span
class="inserted"><ins><em>“consent” is sought, it is buried in
- lengthy terms of service that are difficult</em></ins></span> to
- <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
@@ -1625,63 +1326,47 @@
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data to <span
class="removed"><del><strong>the app developer but did</strong></del></span>
<span class="inserted"><ins><em>Facebook</a>. Lots of companies built
apps that
- way and released them, apparently</em></ins></span> not
- <span class="removed"><del><strong>ask about sending
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the
personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>other companies. This</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It</em></ins></span> shows <span class="inserted"><ins><em>that
no one can trust a nonfree program, not even</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed,</em></ins></span> of <span
class="inserted"><ins><em>which 24,000 (31%) transmit</em></ins></span> the
<span class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em><a
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>other companies, and <a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>anyone? A free</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
+ <li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead</em></ins></span> of <span
class="inserted"><ins><em>“beautifying” them,
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>conversation</strong></del></span>
<span class="inserted"><ins><em>user interface of most of them was designed to
make uninstallation
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
@@ -1980,49 +1665,106 @@
<dd>Injects JavaScript code into HTML pages, and also uses roughly
five tracking libraries. Developers of this app have confirmed that
the non-premium version of the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
- </dl>
+ tracking</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>user and displaying ads.</dd>
+ </dl></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
- <li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <span class="inserted"><ins><em><li id="M201606050">
+ <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
- <li id="M201606050">
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ and suggests you</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>system.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>picture you take according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>who is</em></ins></span>
+ in <span class="removed"><del><strong>iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would</strong></del></span> require <span
class="removed"><del><strong>circumventing</strong></del></span> <span
class="inserted"><ins><em>online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p>
+ </li>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ <li><p>In</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's
servers</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ even if</em></ins></span> the
+ <span class="removed"><del><strong>obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload”</em></ins></span>
them <span class="removed"><del><strong>off—only until 5am.
+ That's Apple for you—“We know you want to be spied
on”.</p>
+ </li>
+
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way</strong></del></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> the <span
class="removed"><del><strong>phone is snooping</strong></del></span> <span
class="inserted"><ins><em>service.</p>
</li>
<li id="M201605310">
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
+ snoop</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>what people are listening to or watching</a>.
In addition,
it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
<li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
- it can alter them too</a>.</p>
+ <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> data <span
class="removed"><del><strong>to Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and
in server accounts,
+ it</em></ins></span> can
+ <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>alter</em></ins></span> them <span
class="removed"><del><strong>from there.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
</li>
- <li id="M201601130">
- <p>Apps that include <a
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="inserted"><ins><em>include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
@@ -2031,39 +1773,73 @@
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
+ unrelated to</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ found in</em></ins></span> the <span class="removed"><del><strong>server
records</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
+
+ <p>The article should not have described</em></ins></span> these
<span class="removed"><del><strong>numbers for at least 30
+ days.</p>
+ </li>
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>apps as
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <li id="M201510300">
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
+ <span
class="removed"><del><strong><li><p>Around</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510300">
+ <p>More than 73% and</em></ins></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>respectively <a
href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
<li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
+ based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of
their</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</em></ins></span> users <span class="removed"><del><strong>with
third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>submit</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>keeps them up to date on all your devices.
+ Any edits you make</strong></del></span> <span
class="inserted"><ins><em>some</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>starting
+ to realize that it</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>nasty.</p>
- <p>This article shows the <a
+ <p>This article shows</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ twisted ways that they present snooping as</em></ins></span> a way to
<span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span> <span
class="inserted"><ins><em>“serve”
+ users better</a>—never mind whether they want that. This
is</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
+ <span class="inserted"><ins><em>typical example</em></ins></span> of <span
class="removed"><del><strong>this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span class="inserted"><ins><em>the
attitude</em></ins></span> of <span class="removed"><del><strong>many
celebrities</a>. They needed to break Apple's
+ security to get at them,</strong></del></span> <span
class="inserted"><ins><em>the proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -2077,7 +1853,7 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
+ “free”,</em></ins></span> but <span
class="removed"><del><strong>NSA can access any</strong></del></span> <span
class="inserted"><ins><em>most</em></ins></span> of them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit perfectly.</p>
@@ -2091,36 +1867,65 @@
</li>
<li id="M201504060">
- <p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
+ <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This
is</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>addition to</em></ins></span>
+ the <span class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>snooping done
by</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>phone
company,</em></ins></span> and <span class="inserted"><ins><em>perhaps by the
OS in
the phone.</p>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
- malware.</p>
+ <p>Don't be distracted by the question of whether the app
developers</em></ins></span>
+ get <span class="removed"><del><strong>other info too.</p>
+ </li>
+
+ <li><p>There</strong></del></span> <span
class="inserted"><ins><em>users to say “I agree”.
That</em></ins></span> is <span class="removed"><del><strong>also a
feature</strong></del></span> <span class="inserted"><ins><em>no
excuse</em></ins></span> for <span class="removed"><del><strong>web sites to
track users,</strong></del></span>
+ <span class="inserted"><ins><em>malware.</p>
</li>
<li id="M201411260">
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ report</em></ins></span> which <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>other apps the user has installed.</em></ins></span>
<a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="removed"><del><strong>still true</strong></del></span>
<span class="inserted"><ins><em>doing this</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> <span class="inserted"><ins><em>a
way</em></ins></span> that <span class="removed"><del><strong>can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>at least is visible</em></ins></span> and <span
class="removed"><del><strong>regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
+ as bad as what</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>others do.</p></em></ins></span>
</li>
- <li id="M201401150.1">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
+ <p>The nonfree Snapchat app's principal purpose is to
restrict</em></ins></span> the <span class="removed"><del><strong>NSA
snoop</strong></del></span>
+ <span class="inserted"><ins><em>use of data</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>user's
computer, but</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
+ it tries to get the user's list</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>other people's phone
numbers</a>.</p>
</li>
@@ -2131,40 +1936,51 @@
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ about sending it</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
+ the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses to say whether it</em></ins></span> can <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means it can do so.</p>
+ <p>That almost certainly means it can do
so.</p></em></ins></span>
</li>
- <li id="M201307110">
+ <span class="removed"><del><strong><li><p>Android tracks
location</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ specifically</em></ins></span> for <span
class="removed"><del><strong>Google</strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p>
</li>
</ul>
@@ -2176,85 +1992,125 @@
<ul class="blurbs">
<li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to</em></ins></span> the <span
class="removed"><del><strong>phone has</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+
+ <p>Morally, we see</em></ins></span> no <span
class="removed"><del><strong>SIM card</a>.</p></li>
- <p>Morally, we see no difference</em></ins></span> between <span
class="removed"><del><strong>two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>having human workers listen and
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with</strong></del></span> <span
class="inserted"><ins><em>difference between having human workers listen and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
<li id="M201806240">
- <p>Red Shell is a spyware that
+ <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>the massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>turn the
phones</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ information</em></ins></span> to <span class="removed"><del><strong>the
microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
+ <span class="inserted"><ins><em>a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
+ “whales” who can be led to spend a lot</em></ins></span> of
<span class="removed"><del><strong>some
+ kind.</p></li>
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
+ use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
+
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span> <span class="inserted"><ins><em>cost
money</em></ins></span>
+ can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
</li>
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
+ to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
- <li id="M200510200">
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ spies on every process running</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+ good deal of personal data</a>, including lots of activities
which</em></ins></span>
+ have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -2267,39 +2123,58 @@
<ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="inserted"><ins><em>people that</em></ins></span> use <span
class="removed"><del><strong>of data on</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <p><small>(It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app</strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
+before <span class="removed"><del><strong>and after
going</strong></del></span> <span class="inserted"><ins><em>Amazon
“smart” TVs.</p>
<ul class="blurbs">
<li id="M202006250">
- <p>TV manufacturers are able to <a
-
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
+ every <span
class="removed"><del><strong>move</a>.</p></strong></del></span>
<span class="inserted"><ins><em>second of what the user is watching</a>.
This is illegal due to
the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p>
+ it through EULAs.</p></em></ins></span>
</li>
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
@@ -2307,28 +2182,48 @@
<p>What is supposed to make this spying acceptable, according to him,
is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
+ nonfree, we don't know what is actually happening behind the
scenes,</em></ins></span>
+ and <span class="removed"><del><strong>email addresses</a> in user's
address
+ book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
+ </li>
+
+ <li>
+ <p>Facebook's app listens</strong></del></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
<p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
+ matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
+ to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ if you are technically oriented, is to get your own router (which
can</em></ins></span>
+ be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>an old
computer running completely free software), and set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>serve
them</strong></del></span> <span class="inserted"><ins><em>block connections to
Vizio's servers. Or, as a last resort,
+ you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>another model.</p></em></ins></span>
</li>
- <li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
+ moral weakness</em></ins></span> of <span class="removed"><del><strong>its
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to
Netflix.</em></ins></span> The <span
class="inserted"><ins><em>Netflix</em></ins></span> app <span
class="removed"><del><strong>will give Verizon the same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2336,20 +2231,41 @@
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ report everything</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app</strong></del></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them,</em></ins></span> and <span
class="inserted"><ins><em>not just broadcasts and
+ cable</a>. Even if</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>image is coming
from</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
+ the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
+ still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>way to
disable the
+ surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data</strong></del></span> <span
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span
class="inserted"><ins><em>these TVs,
+ does not legitimize</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
</li>
<li id="M201511130">
- <p>Some web and TV advertisements play inaudible
+ <p>Some web</em></ins></span> and <span class="inserted"><ins><em>TV
advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>server accounts, it</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers</em></ins></span> can
+ <span class="removed"><del><strong>alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and
other</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -2357,8 +2273,8 @@
<p>Vizio goes a step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
+ “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track you
across devices.</p>
<p>It is possible to turn this off, but having it enabled by default
@@ -2367,300 +2283,262 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for</strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p></em></ins></span>
+ users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>is inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>The</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
<span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with</strong></del></span>
+ <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ what people are watching</a>, even if it isn't a TV
channel.</p></em></ins></span>
</li>
- <li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on <span class="removed"><del><strong>a child's
speech,</strong></del></span> <span class="inserted"><ins><em>what programs
people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
- record</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops</em></ins></span> on what <span class="removed"><del><strong>radio
and TV</strong></del></span> programs
+ <span class="removed"><del><strong>are playing nearby</a>.
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and
even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on what
+ users <span class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
- users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
- </li>
-
- <li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>US or some
+ <span class="inserted"><ins><em><li id="M201502090">
+ <p>The Samsung “Smart” TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>who
+ is in the frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>was surrounded</strong></del></span>
<span class="inserted"><ins><em>is done</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
+ <p>Speech recognition is not</em></ins></span> to be
+ <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is
done by free
+ software in your own computer.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free
- software <span class="removed"><del><strong>which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>third
parties</a>.</p>
</li>
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report</em></ins></span> was <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
- consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
+ And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
+ say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to
<span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
- user <span class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>watches—no
exceptions!</p></em></ins></span>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span>
+ <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
<span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</strong></del></span>
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span class="inserted"><ins><em>user
watches, and</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>switch
to turn this off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> could <span
class="removed"><del><strong>listen to these conversations
- was unacceptable by itself.</p></li>
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save</em></ins></span> that <span
class="inserted"><ins><em>data anyway.)</p>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
- </li>
-</ul>
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is nasty.</p>
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</em></ins></span> the <span
class="inserted"><ins><em>user's local network</a>.</p>
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch is designed
- <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p>
- </li>
- <li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span> <span class="inserted"><ins><em>save that data
anyway.)</p>
-
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
- <p>The article says this is</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
-
- <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>back door,</strong></del></span> <span
class="inserted"><ins><em>patch to stop this,</em></ins></span> but <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>any
- product</em></ins></span> could <span class="removed"><del><strong>be a
- misunderstanding. However, it is certainly surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>spy this way.</p>
-
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p></em></ins></span>
+ <p>Meanwhile, LG TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201212170">
+ <li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ Crackers found</em></ins></span> a way to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
+ and use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security”</em></ins></span> devices
<span class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>,</em></ins></span>
which <span class="removed"><del><strong>other
+ apps</strong></del></span> <span class="inserted"><ins><em>save it
long-term.</p>
- <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span> <span
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span
class="removed"><del><strong>at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>how Ring
used</em></ins></span> to <span class="inserted"><ins><em>let individual
employees look
+ at</em></ins></span> the <span class="removed"><del><strong>snooping done
by the phone company, and perhaps by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>OS in</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
- <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
- at the videos freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ <p>Don't be distracted by</strong></del></span>
+ <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p>
</li>
<li id="M201810300">
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>“clean”
Windows install is</strong></del></span> <span class="inserted"><ins><em>better
+ give</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy</em></ins></span> of
<span class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>to look at
what's</em></ins></span> in <span class="removed"><del><strong>its own
malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
- security for your home. Security means making</em></ins></span> sure <span
class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ manufacturers promise not to look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developers</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
+ security for your home. Security means making sure they
don't</em></ins></span> get
+ <span class="removed"><del><strong>users</strong></del></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p></strong></del></span>
+ <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
+ </li>
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-<ul>
- <li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone</em></ins></span> to <span
class="inserted"><ins><em>watch through them</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
-
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>to outsmart
you.</p></em></ins></span>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>app
developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>to other companies. This shows the
+ weakness of</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
+
+ <li>
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
+
+ <li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ <li id="M201711244"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>child's speech, and even
speak</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two
users</a>.</p></em></ins></span>
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
+ <span class="removed"><del><strong><li></strong></del></span>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
+ <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -2670,7 +2548,7 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>statements about their
+ standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
and changed.</p>
@@ -2686,167 +2564,280 @@
<p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of
C$4m</a></em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
+ </li>
+
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
<div style="clear: left;"></div>
+<ul>
+ <li>
+ <p>An LG</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>watch is designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>i-Que</em></ins></span> transmit
+ <span class="removed"><del><strong>conversations
too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site in China</a>.</p>
+ <p>The article says this is a back door, but that could
be</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
+ least.</p>
+ </li>
+</ul>
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>speech recognition
+ company based</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
- <li>
- <p>Every “home security” camera,
if</strong></del></span> its <span class="removed"><del><strong>manufacturer
can communicate</strong></del></span>
- <span class="inserted"><ins><em>customers.</p>
- </li>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
- <li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>it,
- is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>fact
- that</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>device is tethered to a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
- <p>That</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span
class="removed"><del><strong>company
- surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
- </li>
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <span class="removed"><del><strong><li></strong></del></span>
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <span class="inserted"><ins><em><li id="M201612060"></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest
Cam</strong></del></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span>
+ <li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>snoop on
other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
</ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
- </li></strong></del></span>
+ <li>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201911190">
- <p>Internet-tethered Amazon Ring had</em></ins></span>
- a <span class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"></em></ins></span>
- access <span class="removed"><del><strong>its computers
remotely</strong></del></span> <span class="inserted"><ins><em>the user's wifi
password</a>,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202006300">
+ <p>“Bossware”</em></ins></span> is <span
class="removed"><del><strong>a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>malware that bosses</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span class="removed"><del><strong>manufacturer,
based</strong></del></span>
+ <span class="inserted"><ins><em>bosses can spy</em></ins></span> on <span
class="inserted"><ins><em>these.</p>
+
+ <p>This shows why requiring</em></ins></span> the <span
class="removed"><del><strong>fact
+ that the device</strong></del></span> <span
class="inserted"><ins><em>user's “consent”</em></ins></span> is
<span class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>almost
anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ </li>
- <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed</strong></del></span> <span
class="inserted"><ins><em>household</em></ins></span>
- through <span class="inserted"><ins><em>connected surveillance
devices.</p>
-
- <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>wifi password would not</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>sufficient to carry
- out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span class="inserted"><ins><em>devices
implemented proper
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p>
+ manufacturers for snooping.</p></em></ins></span>
</li>
- <li id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when</em></ins></span> it <span class="removed"><del><strong>demands blind
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to
listen</a>. Thus, when one of Google's
+ <span class="removed"><del><strong><li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
- users were easily identified</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>no
+ way to see or control what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain JavaScript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
- <p>Even if</strong></del></span> <span
class="inserted"><ins><em>these recordings.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the user <span
class="removed"><del><strong>reads at what time</a>.</p>
+ </li>
- <p>Since Google “Assistant” uses proprietary software,
there is</em></ins></span> no <span class="removed"><del><strong>one
connects</strong></del></span>
- <span class="inserted"><ins><em>way to see or control what it records or
sends.</p>
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span> <span
class="inserted"><ins><em>wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
</li>
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it</em></ins></span> to <span
class="inserted"><ins><em>third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+ even if <span class="removed"><del><strong>it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel</em></ins></span> the
<span class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>wrong of
+ deleting</em></ins></span> the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
collecting it.</p>
<p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>cell phone
@@ -3754,7 +3745,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/09 08:02:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- proprietary-surveillance.de.po 26 Jun 2020 23:31:13 -0000 1.330
+++ proprietary-surveillance.de.po 9 Jul 2020 08:02:16 -0000 1.331
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4433,6 +4433,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-surveillance.es.po 27 Jun 2020 11:59:12 -0000 1.48
+++ proprietary-surveillance.es.po 9 Jul 2020 08:02:17 -0000 1.49
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-06-27 13:29+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -3842,6 +3843,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.510
retrieving revision 1.511
diff -u -b -r1.510 -r1.511
--- proprietary-surveillance.fr.po 27 Jun 2020 06:06:37 -0000 1.510
+++ proprietary-surveillance.fr.po 9 Jul 2020 08:02:17 -0000 1.511
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-06-27 08:05+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3848,6 +3849,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-surveillance.it-diff.html 26 Jun 2020 23:31:13 -0000
1.181
+++ proprietary-surveillance.it-diff.html 9 Jul 2020 08:02:17 -0000
1.182
@@ -2715,6 +2715,19 @@
</div>
<ul class="blurbs">
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201911190">
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
@@ -3532,7 +3545,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- proprietary-surveillance.it.po 26 Jun 2020 23:31:13 -0000 1.342
+++ proprietary-surveillance.it.po 9 Jul 2020 08:02:17 -0000 1.343
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4183,6 +4183,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary-surveillance.ja-diff.html 26 Jun 2020 23:31:13 -0000
1.198
+++ proprietary-surveillance.ja-diff.html 9 Jul 2020 08:02:17 -0000
1.199
@@ -2660,6 +2660,19 @@
</div>
<ul class="blurbs">
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201911190">
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
@@ -3373,7 +3386,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/26 23:31:13 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.324
retrieving revision 1.325
diff -u -b -r1.324 -r1.325
--- proprietary-surveillance.ja.po 26 Jun 2020 23:31:13 -0000 1.324
+++ proprietary-surveillance.ja.po 9 Jul 2020 08:02:17 -0000 1.325
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3278,6 +3278,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary-surveillance.pot 26 Jun 2020 23:31:13 -0000 1.263
+++ proprietary-surveillance.pot 9 Jul 2020 08:02:17 -0000 1.264
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2603,6 +2603,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a "
+"href=\"https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\">
"
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a "
"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\">
"
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.606
retrieving revision 1.607
diff -u -b -r1.606 -r1.607
--- proprietary-surveillance.ru.po 27 Jun 2020 07:59:02 -0000 1.606
+++ proprietary-surveillance.ru.po 9 Jul 2020 08:02:17 -0000 1.607
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-26 23:25+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3807,6 +3808,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Internet-tethered Amazon Ring had a security vulnerability that enabled "
"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.de-diff.html 1 Jul 2020 14:02:13 -0000 1.158
+++ proprietary.de-diff.html 9 Jul 2020 08:02:17 -0000 1.159
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -153,17 +153,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
@@ -245,28 +265,6 @@
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
-
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
-
- <p>As a result, anyone can sting the user, not only the
- manufacturer.</p>
- </li>
-
- <li id="M201909061">
- <p>Best Buy made controllable appliances and <a
-
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down the service to control them through</a>.</p>
-
- <p>While it is laudable that Best Buy recognized it was mistreating
- the customers by doing so, this doesn't alter the facts that
- tethering the device to a particular server is a path to screwing the
- users, and that it is a consequence of having nonfree software in the
- device.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -329,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary.de.po 1 Jul 2020 14:02:13 -0000 1.199
+++ proprietary.de.po 9 Jul 2020 08:02:17 -0000 1.200
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -489,34 +513,6 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary.es.po 3 Jul 2020 10:00:44 -0000 1.284
+++ proprietary.es.po 9 Jul 2020 08:02:17 -0000 1.285
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -312,6 +313,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -371,48 +396,6 @@
"1988, esto es ilegal, pero eluden la ley mediante acuerdos de licencia de "
"usuario final."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">Un desastroso fallo "
-"de seguridad</a> afecta a millones de productos del Internet de las Trucosas."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"A consecuencia de esto, cualquiera puede atacar al usuario, no solo el "
-"fabricante."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Best Buy produjo electrodomésticos controlables y luego <a href=\"https://"
-"www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
-"freezer-mobile-app-shutdown-november-6\"> cerró el servicio que permitÃa "
-"controlarlos</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Si bien es loable que Best Buy haya reconocido que al hacerlo estaba "
-"maltratando a los usuarios, esto no cambia el hecho de que vincular un "
-"aparato a un servidor determinado es una forma de aprisionar a los usuarios, "
-"y es una consecuencia de tener en el aparato software que no es libre."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -492,3 +475,44 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\">Un desastroso fallo de seguridad</a> afecta a millones de productos "
+#~ "del Internet de las Trucosas."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "A consecuencia de esto, cualquiera puede atacar al usuario, no solo el "
+#~ "fabricante."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Best Buy produjo electrodomésticos controlables y luego <a
href=\"https://"
+#~ "www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-"
+#~ "wifi-freezer-mobile-app-shutdown-november-6\"> cerró el servicio que "
+#~ "permitÃa controlarlos</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Si bien es loable que Best Buy haya reconocido que al hacerlo estaba "
+#~ "maltratando a los usuarios, esto no cambia el hecho de que vincular un "
+#~ "aparato a un servidor determinado es una forma de aprisionar a los "
+#~ "usuarios, y es una consecuencia de tener en el aparato software que no es "
+#~ "libre."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary.fr.po 1 Jul 2020 16:13:45 -0000 1.329
+++ proprietary.fr.po 9 Jul 2020 08:02:17 -0000 1.330
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-07-01 18:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -368,49 +393,6 @@
"(Video Privacy Protection Act)</cite> rend ceci illégal aux Ãtats-Unis,
mais "
"ils la contournent avec leurs conditions générales d'utilisation."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">Une faille de "
-"sécurité désastreuse</a> touche des millions de produits connectés."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"De ce fait, n'importe qui peut attaquer l'utilisateur, pas seulement le "
-"fabricant."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Best Buy a mis sur le marché des appareils contrôlables à distance, puis a
"
-"<a href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-"
-"insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">arrêté le
"
-"service qui permettait de les contrôler</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Bien qu'on puisse féliciter Best Buy d'avoir reconnu ses torts envers ses "
-"clients dans cette affaire, il n'en reste pas moins que la dépendance d'un "
-"appareil à un serveur particulier conduit naturellement à ce que les "
-"utilisateurs se fassent avoir un jour ou l'autre. C'est une conséquence du "
-"fait que l'appareil fonctionne avec du logiciel privateur."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +467,47 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\">Une faille de sécurité désastreuse</a> touche des millions de "
+#~ "produits connectés."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "De ce fait, n'importe qui peut attaquer l'utilisateur, pas seulement le "
+#~ "fabricant."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Best Buy a mis sur le marché des appareils contrôlables à distance,
puis "
+#~ "a <a href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-"
+#~ "insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">arrêté
"
+#~ "le service qui permettait de les contrôler</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Bien qu'on puisse féliciter Best Buy d'avoir reconnu ses torts envers ses
"
+#~ "clients dans cette affaire, il n'en reste pas moins que la dépendance "
+#~ "d'un appareil à un serveur particulier conduit naturellement à ce que
les "
+#~ "utilisateurs se fassent avoir un jour ou l'autre. C'est une conséquence "
+#~ "du fait que l'appareil fonctionne avec du logiciel privateur."
+
+#~ msgid ""
#~ "Wink sells a “smart” home hub that is tethered to a server. "
#~ "In May 2020, it ordered the purchasers to start <a href=\"https://www."
#~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.it-diff.html 1 Jul 2020 14:02:13 -0000 1.170
+++ proprietary.it-diff.html 9 Jul 2020 08:02:17 -0000 1.171
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,7 +57,7 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -65,7 +65,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -211,6 +211,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
@@ -244,28 +264,6 @@
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
-
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
-
- <p>As a result, anyone can sting the user, not only the
- manufacturer.</p>
- </li>
-
- <li id="M201909061">
- <p>Best Buy made controllable appliances and <a
-
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down the service to control them through</a>.</p>
-
- <p>While it is laudable that Best Buy recognized it was mistreating
- the customers by doing so, this doesn't alter the facts that
- tethering the device to a particular server is a path to screwing the
- users, and that it is a consequence of having nonfree software in the
- device.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -328,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.it.po 1 Jul 2020 14:02:13 -0000 1.208
+++ proprietary.it.po 9 Jul 2020 08:02:17 -0000 1.209
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -493,34 +517,6 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary.ja-diff.html 1 Jul 2020 14:02:13 -0000 1.174
+++ proprietary.ja-diff.html 9 Jul 2020 08:02:17 -0000 1.175
@@ -55,7 +55,7 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -63,7 +63,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -122,47 +122,50 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
- <li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
+</ul>
+</div>
+
+<div class="malfunctions">
+<ul>
+<li><strong>Type of
malware</strong></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li></em></ins></span>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
- <li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
- <li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
- <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
-<span class="removed"><del><strong></div>
-
-<div class="malfunctions"></strong></del></span>
- <span class="inserted"><ins><em></td>
- <td></em></ins></span>
+ </td>
+ <td>
<ul>
-<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -170,9 +173,7 @@
<td colspan="2">
<ol>
<li id="f1"><em>Back door:</em> any feature of a
program
- that enables someone who is not supposed</em></ins></span> to
-<span class="removed"><del><strong>servers</li>
-<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
+ that enables someone who is not supposed to be in control of the
computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
@@ -185,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -208,6 +209,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
@@ -241,28 +262,6 @@
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
-
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
-
- <p>As a result, anyone can sting the user, not only the
- manufacturer.</p>
- </li>
-
- <li id="M201909061">
- <p>Best Buy made controllable appliances and <a
-
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down the service to control them through</a>.</p>
-
- <p>While it is laudable that Best Buy recognized it was mistreating
- the customers by doing so, this doesn't alter the facts that
- tethering the device to a particular server is a path to screwing the
- users, and that it is a consequence of having nonfree software in the
- device.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -325,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary.ja.po 1 Jul 2020 14:02:13 -0000 1.192
+++ proprietary.ja.po 9 Jul 2020 08:02:17 -0000 1.193
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -354,34 +378,6 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- proprietary.nl-diff.html 1 Jul 2020 14:02:13 -0000 1.171
+++ proprietary.nl-diff.html 9 Jul 2020 08:02:17 -0000 1.172
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -211,6 +211,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
@@ -244,28 +264,6 @@
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
-
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
-
- <p>As a result, anyone can sting the user, not only the
- manufacturer.</p>
- </li>
-
- <li id="M201909061">
- <p>Best Buy made controllable appliances and <a
-
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down the service to control them through</a>.</p>
-
- <p>While it is laudable that Best Buy recognized it was mistreating
- the customers by doing so, this doesn't alter the facts that
- tethering the device to a particular server is a path to screwing the
- users, and that it is a consequence of having nonfree software in the
- device.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -328,7 +326,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/01 14:02:13 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.nl.po 1 Jul 2020 14:02:13 -0000 1.182
+++ proprietary.nl.po 9 Jul 2020 08:02:17 -0000 1.183
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -397,34 +421,6 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.pl-diff.html 1 Jul 2020 14:02:14 -0000 1.188
+++ proprietary.pl-diff.html 9 Jul 2020 08:02:17 -0000 1.189
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -155,16 +155,16 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -209,6 +209,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
@@ -242,28 +262,6 @@
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
-
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
-
- <p>As a result, anyone can sting the user, not only the
- manufacturer.</p>
- </li>
-
- <li id="M201909061">
- <p>Best Buy made controllable appliances and <a
-
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down the service to control them through</a>.</p>
-
- <p>While it is laudable that Best Buy recognized it was mistreating
- the customers by doing so, this doesn't alter the facts that
- tethering the device to a particular server is a path to screwing the
- users, and that it is a consequence of having nonfree software in the
- device.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -326,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/01 14:02:14 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.pl.po 1 Jul 2020 14:02:14 -0000 1.175
+++ proprietary.pl.po 9 Jul 2020 08:02:17 -0000 1.176
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -574,34 +598,6 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary.pot 1 Jul 2020 14:02:14 -0000 1.172
+++ proprietary.pot 9 Jul 2020 08:02:17 -0000 1.173
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a "
+"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\"> "
+"enable and disable functionality in cars</a> through a universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a "
+"href=\"https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\">
"
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a "
"href=\"https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\">
"
"addictive features</a> derived from <a "
@@ -292,33 +316,6 @@
"EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">
"
-"A disasterous security bug</a> touches millions of products in the Internet "
-"of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a "
-"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">
"
-"shut down the service to control them through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary.pt-br.po 1 Jul 2020 14:02:14 -0000 1.305
+++ proprietary.pt-br.po 9 Jul 2020 08:02:17 -0000 1.306
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-06-30 08:27-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -306,6 +306,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -354,47 +378,6 @@
"usuário está assistindo</a>. Isso é ilegal devido à Lei de Proteção à "
"Privacidade de VÃdeo de 1988, mas está sendo contornada por meio de EULAs."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> Um erro de segurança
"
-"desastroso</a> afeta milhões de produtos conectados"
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"Como resultado, qualquer um pode atacar o usuário, não apenas o fabricante."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"A Best Buy fabricou aparelhos controláveis e <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> encerrou o serviço que permitia controlá-"
-"los</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Embora seja louvável que a Best Buy tenha reconhecido que estava maltratando
"
-"os clientes, isso não altera os fatos de que amarrar o dispositivo a um "
-"servidor especÃfico é um caminho para atrapalhar os usuários e que é uma "
-"consequência de ter um software não livre no dispositivo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -470,6 +453,47 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> Um erro de segurança desastroso</a> afeta milhões de produtos "
+#~ "conectados"
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "Como resultado, qualquer um pode atacar o usuário, não apenas o "
+#~ "fabricante."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "A Best Buy fabricou aparelhos controláveis e <a href=\"https://www."
+#~ "theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
+#~ "freezer-mobile-app-shutdown-november-6\"> encerrou o serviço que permitia
"
+#~ "controlá-los</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Embora seja louvável que a Best Buy tenha reconhecido que estava "
+#~ "maltratando os clientes, isso não altera os fatos de que amarrar o "
+#~ "dispositivo a um servidor especÃfico é um caminho para atrapalhar os "
+#~ "usuários e que é uma consequência de ter um software não livre no "
+#~ "dispositivo."
+
+#~ msgid ""
#~ "Wink sells a “smart” home hub that is tethered to a server. "
#~ "In May 2020, it ordered the purchasers to start <a href=\"https://www."
#~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary.ru.po 1 Jul 2020 17:03:01 -0000 1.363
+++ proprietary.ru.po 9 Jul 2020 08:02:17 -0000 1.364
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -370,47 +395,6 @@
"ÑаÑÑной жизни в оÑноÑении видео”
Ð´ÐµÐ»Ð°ÐµÑ ÑÑо незаконнÑм, но они обÑ
одÑÑ "
"ÑÑо Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑоглаÑений Ñ Ð¿Ð¾Ð»ÑзоваÑелем."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">
ÐаÑаÑÑÑоÑиÑеÑÐºÐ°Ñ "
-"оÑибка в заÑиÑе</a> заÑÑÐ°Ð³Ð¸Ð²Ð°ÐµÑ Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ
пÑодÑкÑов в ÐнÑеÑнеÑе клеÑей."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"Ð ÑезÑлÑÑаÑе ÑжалиÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ
лÑбой, а не ÑолÑко изгоÑовиÑелÑ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Best Buy вÑпÑÑÑила ÑпÑавлÑемÑе
бÑÑовÑе ÑÑÑÑойÑÑва и <a href="
-"\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-"
-"plug-wifi-freezer-mobile-app-shutdown-november-6\"> пÑекÑаÑила
ÑабоÑÑ "
-"ÑлÑжбÑ, ÑеÑез коÑоÑÑÑ Ð¾Ð½Ð¸ ÑпÑавлÑлиÑÑ</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"ХоÑÑ Ñо ÑÑоÑÐ¾Ð½Ñ Best Buy поÑ
валÑно, ÑÑо
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ñизнала, ÑÑо ÑÑо бÑло "
-"неÑпÑаведливо в оÑноÑении клиенÑов, но
ÑÑо не изменÑÐµÑ Ñого ÑакÑа, ÑÑо "
-"пÑивÑзка ÑÑÑÑойÑÑва к конкÑеÑномÑ
ÑеÑвеÑÑ — пеÑвÑй Ñаг к Ð¾Ð±Ð¼Ð°Ð½Ñ "
-"полÑзоваÑелей, благодаÑÑ ÑомÑ, ÑÑо на
ÑÑÑÑойÑÑве ÑÑоÑÑ Ð½ÐµÑвободнÑе пÑогÑаммÑ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -487,6 +471,46 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> ÐаÑаÑÑÑоÑиÑеÑÐºÐ°Ñ Ð¾Ñибка в заÑиÑе</a>
заÑÑÐ°Ð³Ð¸Ð²Ð°ÐµÑ Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ "
+#~ "пÑодÑкÑов в ÐнÑеÑнеÑе клеÑей."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "Ð ÑезÑлÑÑаÑе ÑжалиÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ
лÑбой, а не ÑолÑко изгоÑовиÑелÑ."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Best Buy вÑпÑÑÑила ÑпÑавлÑемÑе
бÑÑовÑе ÑÑÑÑойÑÑва и <a href="
+#~ "\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-"
+#~ "smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">
пÑекÑаÑила "
+#~ "ÑабоÑÑ ÑлÑжбÑ, ÑеÑез коÑоÑÑÑ Ð¾Ð½Ð¸
ÑпÑавлÑлиÑÑ</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "ХоÑÑ Ñо ÑÑоÑÐ¾Ð½Ñ Best Buy поÑ
валÑно, ÑÑо
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð¿Ñизнала, ÑÑо ÑÑо бÑло "
+#~ "неÑпÑаведливо в оÑноÑении клиенÑов, но
ÑÑо не изменÑÐµÑ Ñого ÑакÑа, ÑÑо "
+#~ "пÑивÑзка ÑÑÑÑойÑÑва к конкÑеÑномÑ
ÑеÑвеÑÑ — пеÑвÑй Ñаг к "
+#~ "Ð¾Ð±Ð¼Ð°Ð½Ñ Ð¿Ð¾Ð»ÑзоваÑелей, благодаÑÑ ÑомÑ,
ÑÑо на ÑÑÑÑойÑÑве ÑÑоÑÑ Ð½ÐµÑвободнÑе "
+#~ "пÑогÑаммÑ."
+
+#~ msgid ""
#~ "Wink sells a “smart” home hub that is tethered to a server. "
#~ "In May 2020, it ordered the purchasers to start <a href=\"https://www."
#~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary.tr.po 1 Jul 2020 16:23:52 -0000 1.31
+++ proprietary.tr.po 9 Jul 2020 08:02:17 -0000 1.32
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-07-01 18:03+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-07-09 07:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.3\n"
@@ -305,6 +306,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -362,46 +387,6 @@
"Yasası'na göre yasadıÅı, fakat son kullanıcı lisans anlaÅmaları
(EULA) "
"aracılıÄıyla bu yasayı geçiÅtiriyorlar."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/"
-"\">Felaket bir güvenlik açıÄı</a> Ä°Änelerin Ä°nternetindeki
milyonlarca ürüne "
-"zarar veriyor."
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-"Sonuç olarak, salt üretici deÄil herhangi bir kimse kullanıcıyı
sokabiliyor."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"Best Buy kontrol edilebilir gereçler yapıyor ve <a href=\"https://www."
-"theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
-"freezer-mobile-app-shutdown-november-6\"> onları denetlediÄi hizmeti "
-"kapattı</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"Best Buy'ın müÅterilere bu Åekilde kötü davrandıÄını kabul etmesi
takdire "
-"Åayan olsa da, bir aygıtı belirli bir sunucuya baÄlamanın
kullanıcıları "
-"aldatmaya doÄru bir yol olduÄu ve bu durumun aygıtta özgür olmayan
yazılım "
-"olmasının bir sonucu olduÄu gerçeÄini deÄiÅtirmiyor."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -482,6 +467,44 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/"
+#~ "\">Felaket bir güvenlik açıÄı</a> Ä°Änelerin Ä°nternetindeki
milyonlarca "
+#~ "ürüne zarar veriyor."
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr ""
+#~ "Sonuç olarak, salt üretici deÄil herhangi bir kimse kullanıcıyı "
+#~ "sokabiliyor."
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "Best Buy kontrol edilebilir gereçler yapıyor ve <a href=\"https://www."
+#~ "theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-"
+#~ "freezer-mobile-app-shutdown-november-6\"> onları denetlediÄi hizmeti "
+#~ "kapattı</a>."
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~ "Best Buy'ın müÅterilere bu Åekilde kötü davrandıÄını kabul
etmesi takdire "
+#~ "Åayan olsa da, bir aygıtı belirli bir sunucuya baÄlamanın
kullanıcıları "
+#~ "aldatmaya doÄru bir yol olduÄu ve bu durumun aygıtta özgür olmayan "
+#~ "yazılım olmasının bir sonucu olduÄu gerçeÄini deÄiÅtirmiyor."
+
+#~ msgid ""
#~ "Wink sells a “smart” home hub that is tethered to a server. "
#~ "In May 2020, it ordered the purchasers to start <a href=\"https://www."
#~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary.zh-cn.po 1 Jul 2020 14:02:14 -0000 1.29
+++ proprietary.zh-cn.po 9 Jul 2020 08:02:17 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-06-27 12:24+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -289,6 +289,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -333,44 +357,6 @@
"å¹´çè§é¢éç§ä¿æ¤æ³æ¡ï¼Video Privacy Protection Actï¼ï¼è¿æ
·åæ¶è¿æ³çï¼ä½æ¯å"
"å们éè¿ EULA<sup><a href=\"#TransNote1\">1</a></sup>
设æ³è§é¿è¿å»äºã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\">ä¸ä¸ªç¾é¾æ§å®å
¨ç¼ºé·</"
-"a> æ³¢åæ°ç¾ä¸ Internet of Stings<sup><a href=\"#TransNote2\">2</a></sup>
产"
-"åã"
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr "å
¶åææ¯ï¼æ¯ä¸ªäººé½å¯ä»¥ä¼¤å®³ç¨æ·ï¼è并éåªæ设å¤å¶é åã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-"ç¾æä¹°ï¼Best Buyï¼å¶é äºä¸äºå¯æ§å·¥å
·å´ <a
href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\">å
³åäºæå¡æ¥æ§å¶å®ä»¬</a>ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-"è½ç¶ç¾æä¹°èªå·±ä¹æè¯å°è¿æ¯å¯¹ç¨æ·ç伤害ââè¿ä¸ç¹å¼å¾èµæ¬ï¼ä½æ¯è¿å¹¶æ²¡ææ¹åæ设"
-"å¤åæå¡å¨ç»å®æ¯ç©å¼ç¨æ·çäºå®ï¼èè¿æ£æ¯è®¾å¤ä¸ä½¿ç¨éèªç±è½¯ä»¶çåæã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -455,6 +441,41 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\"> A disasterous security bug</a> touches millions of products in the "
+#~ "Internet of Stings."
+#~ msgstr ""
+#~ "<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
+#~ "bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&"
+#~ "esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran"
+#~ "%5C\">ä¸ä¸ªç¾é¾æ§å®å
¨ç¼ºé·</a> æ³¢åæ°ç¾ä¸ Internet of
Stings<sup><a href="
+#~ "\"#TransNote2\">2</a></sup> 产åã"
+
+#~ msgid "As a result, anyone can sting the user, not only the manufacturer."
+#~ msgstr "å
¶åææ¯ï¼æ¯ä¸ªäººé½å¯ä»¥ä¼¤å®³ç¨æ·ï¼è并éåªæ设å¤å¶é åã"
+
+#~ msgid ""
+#~ "Best Buy made controllable appliances and <a href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\"> shut down the service to control them "
+#~ "through</a>."
+#~ msgstr ""
+#~ "ç¾æä¹°ï¼Best Buyï¼å¶é äºä¸äºå¯æ§å·¥å
·å´ <a
href=\"https://www.theverge."
+#~ "com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+#~ "mobile-app-shutdown-november-6\">å
³åäºæå¡æ¥æ§å¶å®ä»¬</a>ã"
+
+#~ msgid ""
+#~ "While it is laudable that Best Buy recognized it was mistreating the "
+#~ "customers by doing so, this doesn't alter the facts that tethering the "
+#~ "device to a particular server is a path to screwing the users, and that "
+#~ "it is a consequence of having nonfree software in the device."
+#~ msgstr ""
+#~
"è½ç¶ç¾æä¹°èªå·±ä¹æè¯å°è¿æ¯å¯¹ç¨æ·ç伤害ââè¿ä¸ç¹å¼å¾èµæ¬ï¼ä½æ¯è¿å¹¶æ²¡ææ¹åæ"
+#~
"设å¤åæå¡å¨ç»å®æ¯ç©å¼ç¨æ·çäºå®ï¼èè¿æ£æ¯è®¾å¤ä¸ä½¿ç¨éèªç±è½¯ä»¶çåæã"
+
+#~ msgid ""
#~ "Wink sells a “smart” home hub that is tethered to a server. "
#~ "In May 2020, it ordered the purchasers to start <a href=\"https://www."
#~ "techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary.zh-tw-diff.html 1 Jul 2020 14:02:14 -0000 1.151
+++ proprietary.zh-tw-diff.html 9 Jul 2020 08:02:17 -0000 1.152
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -153,17 +153,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,26 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202007010">
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a> through a universal
+ back door.</p>
+ </li>
+
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on these.</p>
+
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contageous disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
<li id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
@@ -245,28 +265,6 @@
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
-
- <li id="M202006160">
- <p><a
-
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C">
- A disasterous security bug</a> touches millions of products in the
- Internet of Stings.</p>
-
- <p>As a result, anyone can sting the user, not only the
- manufacturer.</p>
- </li>
-
- <li id="M201909061">
- <p>Best Buy made controllable appliances and <a
-
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
- shut down the service to control them through</a>.</p>
-
- <p>While it is laudable that Best Buy recognized it was mistreating
- the customers by doing so, this doesn't alter the facts that
- tethering the device to a particular server is a path to screwing the
- users, and that it is a consequence of having nonfree software in the
- device.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -329,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/07/01 14:02:14 $
+$Date: 2020/07/09 08:02:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.zh-tw.po 1 Jul 2020 14:02:14 -0000 1.162
+++ proprietary.zh-tw.po 9 Jul 2020 08:02:17 -0000 1.163
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-07-01 13:56+0000\n"
+"POT-Creation-Date: 2020-07-09 07:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Runescape is a popular online game with some <a href=\"https://www.reddit."
"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
"addictive features</a> derived from <a href=\"/proprietary/proprietary-"
@@ -467,34 +491,6 @@
"Act of 1988, but they're circumventing it through EULAs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.wired.com/story/ripple20-iot-vulnerabilities/?"
-"bxid=5bd66d4c2ddf9c619437e4b8&cndid=9608804&esrc=Wired_etl_load&"
-"source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&utm_bran%5C\"> A disasterous "
-"security bug</a> touches millions of products in the Internet of Stings."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid "As a result, anyone can sting the user, not only the manufacturer."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Best Buy made controllable appliances and <a href=\"https://www.theverge."
-"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
-"mobile-app-shutdown-november-6\"> shut down the service to control them "
-"through</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"While it is laudable that Best Buy recognized it was mistreating the "
-"customers by doing so, this doesn't alter the facts that tethering the "
-"device to a particular server is a path to screwing the users, and that it "
-"is a consequence of having nonfree software in the device."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- pt-br.po 1 Jul 2020 14:02:14 -0000 1.254
+++ pt-br.po 9 Jul 2020 08:02:17 -0000 1.255
@@ -3023,6 +3023,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -8584,6 +8591,23 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.422
retrieving revision 1.423
diff -u -b -r1.422 -r1.423
--- ru.po 1 Jul 2020 16:25:23 -0000 1.422
+++ ru.po 9 Jul 2020 08:02:17 -0000 1.423
@@ -3692,6 +3692,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -4489,14 +4496,15 @@
"becoming a paying member, and can thus encourage children and impressionable "
"people to spend money on the game."
msgstr ""
-"Runescape — попÑлÑÑÐ½Ð°Ñ ÑеÑÐµÐ²Ð°Ñ Ð¸Ð³Ñа Ñ
некоÑоÑÑми <a href=\"https://www.reddit."
-"com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/\"> "
-"вÑзÑваÑÑими завиÑимоÑÑÑ Ð¾ÑобенноÑÑÑми</a>,
оÑнованнÑми на <a href=\"/proprietary/proprietary-"
+"Runescape — попÑлÑÑÐ½Ð°Ñ ÑеÑÐµÐ²Ð°Ñ Ð¸Ð³Ñа Ñ
некоÑоÑÑми <a href="
+"\"https://www.reddit.com/r/runescape/comments/33cd8g/"
+"question_why_is_runescape_so_addicting/\"> вÑзÑваÑÑими
завиÑимоÑÑÑ "
+"оÑобенноÑÑÑми</a>, оÑнованнÑми на <a
href=\"/proprietary/proprietary-"
"addictions.html#addictiveness\"> ÑеÑ
нике манипÑлÑÑии
поведением</a>. "
-"ÐпÑеделеннÑе повÑоÑÑÑÑиеÑÑ Ð°ÑпекÑÑ Ð¸Ð³ÑÑ,
Ñакие как <a href=\"https://en.wikipedia."
-"org/wiki/Grinding_(video_games)\"> ÑлиÑование</a>, можно
ÑвеÑÑи к минимÑмÑ, ÑÑав "
-"плаÑнÑм Ñленом, и Ñаким обÑазом можно
пооÑÑÑÑÑ ÑÑаÑÑ Ð´ÐµÐ½ÐµÐ³ на игÑÑ Ð´ÐµÑÑми и "
-"впеÑаÑлиÑелÑнÑми лÑдÑми."
+"ÐпÑеделеннÑе повÑоÑÑÑÑиеÑÑ Ð°ÑпекÑÑ Ð¸Ð³ÑÑ,
Ñакие как <a href=\"https://en."
+"wikipedia.org/wiki/Grinding_(video_games)\"> ÑлиÑование</a>,
можно ÑвеÑÑи к "
+"минимÑмÑ, ÑÑав плаÑнÑм Ñленом, и Ñаким
обÑазом можно пооÑÑÑÑÑ ÑÑаÑÑ Ð´ÐµÐ½ÐµÐ³ на "
+"игÑÑ Ð´ÐµÑÑми и впеÑаÑлиÑелÑнÑми лÑдÑми."
#. type: Content of: <div><div><ul><li><p>
msgid ""
@@ -10432,6 +10440,23 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- tr.po 1 Jul 2020 16:32:18 -0000 1.27
+++ tr.po 9 Jul 2020 08:02:17 -0000 1.28
@@ -2641,6 +2641,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7534,6 +7541,23 @@
msgid "Latest additions"
msgstr "Son eklenenler"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- zh-cn.po 1 Jul 2020 14:02:14 -0000 1.23
+++ zh-cn.po 9 Jul 2020 08:02:17 -0000 1.24
@@ -2642,6 +2642,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7321,6 +7328,23 @@
msgid "Latest additions"
msgstr "ææ°æ·»å "
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#
#
#
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- zh-tw.po 1 Jul 2020 14:02:14 -0000 1.191
+++ zh-tw.po 9 Jul 2020 08:02:18 -0000 1.192
@@ -2704,6 +2704,13 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
+"as-a-platform/\"> enable and disable functionality in cars</a> through a "
+"universal back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -7560,6 +7567,23 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
+"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
+"coerce workers into installing in their own computers</a>, so the bosses can "
+"spy on these."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"This shows why requiring the user's “consent” is not an adequate "
+"basis for protecting digital privacy. The boss can coerce most workers into "
+"consenting to almost anything, even probable exposure to contageous disease "
+"that can be fatal. Software like this should be illegal and bosses that "
+"demand it should be prosecuted for it."
+msgstr ""
+
#
#
#