[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary.pt-br.html po/de.po...
From: |
GNUN |
Subject: |
www/proprietary proprietary.pt-br.html po/de.po... |
Date: |
Fri, 16 Oct 2020 07:32:32 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/10/16 07:32:31
Modified files:
proprietary : proprietary.pt-br.html
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.215&r2=1.216
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.344&r2=1.345
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.541&r2=1.542
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.633&r2=1.634
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.324&r2=1.325
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.365&r2=1.366
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.209&r2=1.210
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.400&r2=1.401
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.478&r2=1.479
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.216&r2=1.217
Patches:
Index: proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.pt-br.html 11 Oct 2020 17:28:42 -0000 1.86
+++ proprietary.pt-br.html 16 Oct 2020 11:32:28 -0000 1.87
@@ -3,7 +3,7 @@
https://www.gnu.org/proprietary/po/proprietary.pt-br.po</a>'
--><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary.html"
--><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary.pt-br-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2020-08-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2020-08-12" -->
<!--#include virtual="/server/html5-header.pt-br.html" -->
<!-- Parent-Version: 1.86 -->
@@ -319,7 +319,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2020/10/11 17:28:42 $
+$Date: 2020/10/16 11:32:28 $
<!-- timestamp end -->
</p>
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/de.po 7 Oct 2020 17:02:19 -0000 1.216
+++ po/de.po 16 Oct 2020 11:32:28 -0000 1.217
@@ -12252,6 +12252,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+word “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
+# | “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -12267,14 +12295,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -12331,6 +12351,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- po/es.po 7 Oct 2020 17:02:19 -0000 1.310
+++ po/es.po 16 Oct 2020 11:32:28 -0000 1.311
@@ -12159,6 +12159,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
+"philosophy/free-sw.html\">software libre</a>” para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -12183,28 +12211,6 @@
"accused-watching-Instagram-users-mobile-cameras.html\">espÃa a los usuarios "
"de Instagram</a> activando a escondidas la cámara del dispositivo."
-#. type: Content of: <div><ul><li><p>
-# | Oc[-c-]ulus headsets <a
-# |
href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\">require
-# | users to identify themselves to Facebook</a>. This will give Facebook free
-# | rein to pervasively snoop on Oc[-c-]ulus users.
-#, fuzzy
-#| msgid ""
-#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
-#| "\">require users to identify themselves to Facebook</a>. This will give "
-#| "Facebook free rein to pervasively snoop on Occulus users."
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Los cascos Occulus<a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">exigen a los usuarios identificarse en Facebook</a>. Esto da a Facebook "
-"plena capacidad para espiar en todo momento a los usuarios de Occulus."
-
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -12273,6 +12279,28 @@
"tales situaciones."
#. type: Content of: <div><div><ul><li><p>
+# | Oc[-c-]ulus headsets <a
+# |
href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\">require
+# | users to identify themselves to Facebook</a>. This will give Facebook free
+# | rein to pervasively snoop on Oc[-c-]ulus users.
+#, fuzzy
+#| msgid ""
+#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#| "\">require users to identify themselves to Facebook</a>. This will give "
+#| "Facebook free rein to pervasively snoop on Occulus users."
+msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Los cascos Occulus<a href=\"https://www.theverge.com/2020/8/18/21372435/"
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">exigen a los usuarios identificarse en Facebook</a>. Esto da a Facebook "
+"plena capacidad para espiar en todo momento a los usuarios de Occulus."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- po/fr.po 7 Oct 2020 20:00:19 -0000 1.382
+++ po/fr.po 16 Oct 2020 11:32:28 -0000 1.383
@@ -10695,6 +10695,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Notez que cet article emploie à mauvais escient l'expression "
+"<cite><a href=\"/philosophy/free-sw.html\">free software</a></cite> dans le "
+"sens de « logiciel gratuit ».)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -10720,18 +10748,6 @@
"utilisateurs d'Instagram</a> en activant subrepticement la caméra du "
"téléphone."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera à "
-"Facebook carte blanche pour les espionner systématiquement."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -10785,6 +10801,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera à "
+"Facebook carte blanche pour les espionner systématiquement."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/it.po 7 Oct 2020 17:02:19 -0000 1.216
+++ po/it.po 16 Oct 2020 11:32:29 -0000 1.217
@@ -11486,6 +11486,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -11501,14 +11517,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11567,6 +11575,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/ja.po 7 Oct 2020 17:02:19 -0000 1.224
+++ po/ja.po 16 Oct 2020 11:32:29 -0000 1.225
@@ -8953,6 +8953,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -8968,14 +8984,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -9029,6 +9037,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- po/nl.po 7 Oct 2020 17:02:19 -0000 1.217
+++ po/nl.po 16 Oct 2020 11:32:29 -0000 1.218
@@ -8303,6 +8303,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -8318,14 +8334,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8383,6 +8391,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/pl.po 7 Oct 2020 17:02:19 -0000 1.216
+++ po/pl.po 16 Oct 2020 11:32:29 -0000 1.217
@@ -7801,6 +7801,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7816,14 +7832,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -7882,6 +7890,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.215
retrieving revision 1.216
diff -u -b -r1.215 -r1.216
--- po/pot 7 Oct 2020 17:02:19 -0000 1.215
+++ po/pot 16 Oct 2020 11:32:29 -0000 1.216
@@ -7129,6 +7129,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7144,14 +7160,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#
#
#
@@ -7196,6 +7204,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/proprietary-surveillance.de-diff.html 7 Oct 2020 17:02:20 -0000
1.130
+++ po/proprietary-surveillance.de-diff.html 16 Oct 2020 11:32:29 -0000
1.131
@@ -759,86 +759,145 @@
<li id="M201711250">
<p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
+ <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
+ <p>In</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>JS injection is</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ to use</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>without having your fingerprints taken. Users would
have
+ no way to tell whether</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
+ lots</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
them from there.</p>
</li>
<li id="M201609280">
- <p>The iMessage app on iThings <a
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>have
+ confirmed</strong></del></span> <span class="inserted"><ins><em>on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
- </li>
+ a server every phone number</em></ins></span> that the <span
class="removed"><del><strong>non-premium version of</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span>
+ <span class="inserted"><ins><em>server records these
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and
display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>at least
30 days.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
- <li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of</strong></del></span> <span class="inserted"><ins><em>photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. […]
</p></blockquote>
+ take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up
to date on all your devices. Any edits you
+ make</em></ins></span> are <span class="removed"><del><strong>not in
fact</strong></del></span> <span class="inserted"><ins><em>automatically
updated everywhere. […] </p></blockquote>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
+ <p>(From</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART</strong></del></span>
+ <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track
users</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by
+ <span class="removed"><del><strong><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>the
startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There is a way to
- <a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so it still counts as a
- surveillance functionality.</p>
+ <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or
played</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
+ </p>
- <p>Unknown people apparently took advantage of this to <a
-
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
- </li>
+</li>
- <li id="M201409220">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+<li>
+ <p>Pairs</strong></del></span> <span class="inserted"><ins><em>default
so it still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>Android apps can collude to transmit users'
personal
+ data</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
+ security to get at them, but NSA can access any</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
+ <p>Apple can, and regularly does,</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install the app</a>.</p>
+
+<p>Merely asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>“consent” of users
is</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
+ not <span class="removed"><del><strong>enough</strong></del></span> <span
class="inserted"><ins><em>as much as Apple claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>“Terms and
Conditions” that spell out
+what they are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -846,14 +905,14 @@
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span>
+ <span class="inserted"><ins><em>get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all the data in an iThing, or it
is totally incompetent</a>.</p>
</li>
@@ -865,20 +924,27 @@
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track users, which is
<a
+ <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
+ still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
</li>
<li id="M201204280">
- <p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
- to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p>
+ <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
+ to it.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -888,10 +954,15 @@
<ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
+ <p>Xiaomi phones</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span class="inserted"><ins><em>a song. They
send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
@@ -937,44 +1008,69 @@
tracks the users' movements without their permission</a>.</p>
<p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
+ disable Google Play itself to completely stop the
tracking.</em></ins></span> This is
yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p></strong></del></span>
+ <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ of some kind.</p></em></ins></span>
</li>
- <li id="M201403120">
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>system.</p>
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a> (presumably Windows laptops). Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
+ “zero price” is “gratis.”</p>
- <li id="M201307280">
- <p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that <a
+ <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
+ Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
+ and <span class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably Windows laptops). Here
is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware</em></ins></span> is present in some Android devices when
they are
+ sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
+ by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ <span class="removed"><del><strong>send</strong></del></span>
+ <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
</li>
- <li id="M201307250">
+ <span
class="removed"><del><strong><li><p>Some</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307250">
<p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
listens for voice all the time</a>.</p>
@@ -998,14 +1094,24 @@
</li>
<li id="M201111170">
- <p>Some manufacturers add a <a
+ <p>Some</em></ins></span> manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
</li>
</ul>
-<div class="big-subsection">
+
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
<h4 id="SpywareInElectronicReaders">E-Readers</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
@@ -1014,7 +1120,7 @@
<li id="M201603080">
<p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
</li>
<li id="M201410080">
@@ -1035,42 +1141,50 @@
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201912190">
<p>Some Avast and AVG extensions
for Firefox and Chrome were found to <a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>. Mozilla and Google
- removed the problematic extensions from their stores, but this shows
+ snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span class="inserted"><ins><em>Google
+ removed</em></ins></span> the <span class="removed"><del><strong>EU
Copyright Directive make</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
once more how unsafe nonfree software can be. Tools that are supposed
- to protect a proprietary system are, instead, infecting it with
+ to protect a proprietary system are, instead, infecting</em></ins></span>
it <span class="inserted"><ins><em>with
additional malware (the system itself being the original
malware).</p>
</li>
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because</strong></del></span> <span class="inserted"><ins><em>identify who is
running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used for repression of forbidden sharing
+ <p>The fact that</em></ins></span> this
+ <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
makes it even more vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span
class="removed"><del><strong><li><p>In</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1080,45 +1194,62 @@
<ul class="blurbs">
<li id="M202003010">
<p>The Alipay Health Code app
- estimates whether the user has Covid-19 and <a
-
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ estimates whether</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
+ obvious way</strong></del></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
tells the cops directly</a>.</p>
</li>
<li id="M202001290">
- <p>The Amazon Ring app does <a
+ <p>The Amazon Ring app</em></ins></span> does <span
class="removed"><del><strong>turn them off—only until 5am.
+ That's Apple</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for Amazon</a>.</p>
+ surveillance</em></ins></span> for <span
class="removed"><del><strong>you—“We know you
want</strong></del></span> <span class="inserted"><ins><em>other companies as
well as for Amazon</a>.</p>
</li>
<li id="M201912220">
- <p>The ToToc messaging app seems to be a <a
-
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ <p>The ToToc messaging app seems</em></ins></span> to be <span
class="removed"><del><strong>spied on”.</p>
+ </li>
+
+ <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
spying tool for the government of the United Arab Emirates</a>.
Any nonfree program could be doing this, and that is a good
- reason to use free software instead.</p>
+ reason</em></ins></span> to use <span class="removed"><del><strong>it
without having your fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>free software instead.</p>
- <p><small>Note: this article uses the word “free”
in
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>phone is</strong></del></span> <span
class="inserted"><ins><em>word “free” in
the sense of “gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"></em></ins></span>
+ snooping <span class="inserted"><ins><em>and sabotage
capabilities</a> if they install their own
+ software</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span> <span
class="inserted"><ins><em>the device. Many employers demand</em></ins></span>
to <span class="removed"><del><strong>Apple's servers</a>. Big Brother
can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>do this. For the
employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ and as dangerous as any other nonfree software.</p></em></ins></span>
</li>
- <li id="M201910130">
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130">
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ the Great Nation”</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
+ internet history</a>, and the Android version was found to
contain</em></ins></span> a <span class="removed"><del><strong>server every
phone number</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish in the users'
phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
@@ -1126,115 +1257,208 @@
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
+ saying</em></ins></span> that the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on</em></ins></span> the
<span class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>Android version
of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
+ Apple's operating system.”</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909091">
+ <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users</em></ins></span> even <span
class="removed"><del><strong>gratis apps)</a>
+ without</strong></del></span> <span class="inserted"><ins><em>when it is
turned off</a>, after tricking them
+ into</em></ins></span> giving <span class="removed"><del><strong>a valid
email address and receiving</strong></del></span> the <span
class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>app broad
permissions in order</em></ins></span> to <span
class="removed"><del><strong>it.</p>
</li>
- <li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>use one</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>its
functionalities.</p>
</li>
<li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to Facebook</a>.</p>
+ <p>Some nonfree period-tracking</em></ins></span> apps <span
class="inserted"><ins><em>including MIA Fem and Maya</em></ins></span> <a
<span class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers all the
photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>users' lives</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
+ program</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</strong></del></span> <span class="inserted"><ins><em>a
form</em></ins></span> of <span class="removed"><del><strong>iOS</a>. The
term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>surveillance. There</em></ins></span> is a <span
class="removed"><del><strong>way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span>
+ <span class="inserted"><ins><em>proprietary program for
adjusting</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown</strong></del></span> <span
class="inserted"><ins><em>certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of all the 10,000 or more people
- who have installed it</a>.</p>
+ A US prosecutor has demanded the list of all the 10,000 or
more</em></ins></span> people <span class="removed"><del><strong>apparently
took advantage</strong></del></span>
+ <span class="inserted"><ins><em>who have installed it</a>.</p>
- <p>With a free program there would not be a list of who has installed
+ <p>With a free program there would not be a list</em></ins></span>
of <span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>who has installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways to <a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system, in order to gather as much private data as
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features</em></ins></span>
+ of <span class="removed"><del><strong>many celebrities</a>. They
needed to break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>the
operating system, in order</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>gather as much private data as
they possibly can.</p>
- <p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ <p>Thus, we can't trust rules against spying. What
we</em></ins></span> can <span class="removed"><del><strong>access any of them
through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>trust is
+ having control over</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>software we
run.</p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says <a
+ users' movements even when</em></ins></span> the <span
class="removed"><del><strong>iThing is,
+ and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a> by natalist Christians. It spreads distrust
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>secretly</em></ins></span> a <span
class="removed"><del><strong>feature for web sites to track users, which
is</strong></del></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a></em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
+ is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
requirement to run a proprietary phone app</a> to be allowed into
the event.</p>
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ <p>This app is a spyware</em></ins></span> that can <span
class="removed"><del><strong>be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>snoop on a lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>contact list, and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
</li>
- <li id="M201904131">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the
+ data <span class="removed"><del><strong>in an iThing,
+ or it</strong></del></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
+ </li>
- <p>This has harmful implications for women's rights to equal
employment
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>“anonymized and aggregated,” it can
easily be
+ traced back</em></ins></span> to <span
class="removed"><del><strong>exist</strong></del></span> <span
class="inserted"><ins><em>the woman who uses the app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
and freedom to make their own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p>
+ free-software app that does more or less</em></ins></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular Android
apps</strong></del></span> <span class="inserted"><ins><em>same thing without
+ spying on you</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>available from <a
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
+ a <span class="removed"><del><strong>physical store by noticing WiFi
+ networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>new one is being
developed</a>.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google</em></ins></span> tracks <span
class="removed"><del><strong>location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span> the <span class="removed"><del><strong>phone
has no SIM card</a>.</p></li>
- <li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
+ <li><p>Some portable</strong></del></span> <span
class="inserted"><ins><em>movements of Android</em></ins></span> phones <span
class="inserted"><ins><em>and iPhones
+ running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the</em></ins></span> data <span class="inserted"><ins><em>for
years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software in the phone has</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending
+ the location data</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
+ <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>data, or pass it</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps that have
access</em></ins></span> to
+ the <span class="removed"><del><strong>microphone, retrieve geo-location
data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>data.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> <span
class="inserted"><ins><em>results in massive
surveillance on which the user has absolutely no control.</p>
</li>
@@ -1245,59 +1469,126 @@
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
+ lengthy terms of service that are difficult</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <li id="M201902230">
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
- </li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>users can't
delete</a>,</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and <span
class="removed"><del><strong>they send so much</strong></del></span> <span
class="inserted"><ins><em>released them, apparently not realizing that all the
personal</em></ins></span>
+ data <span class="inserted"><ins><em>they collected would go to Facebook
as well.</p>
+
+ <p>It shows</em></ins></span> that <span
class="removed"><del><strong>their transmission is</strong></del></span> <span
class="inserted"><ins><em>no one can trust</em></ins></span> a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission,</strong></del></span> <span class="inserted"><ins><em>nonfree
program,</em></ins></span> not <span class="removed"><del><strong>wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>even</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span>
+ <span class="inserted"><ins><em>developers</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone
in</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi">
how</em></ins></span> Android
+ <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>apps use</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>hardware
identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>to restrict
+ the use</strong></del></span> <span class="inserted"><ins><em>in
apparent violation</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but</strong></del></span>
+ <span class="inserted"><ins><em>Google's policies. But</em></ins></span>
it <span class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list</strong></del></span> <span
class="inserted"><ins><em>seems that Google wasn't aware</em></ins></span> of
<span class="removed"><del><strong>other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>it,
+ and, once informed, was</em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The moviepass app and dis-service spy on users even more than
users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</strong></del></span> <span
class="inserted"><ins><em>no hurry</em></ins></span> to <span
class="inserted"><ins><em>take action. This proves
+ that the policies of</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
preventing nonfree software developers from including malware in
- their programs.</p>
+ their programs.</p></em></ins></span>
</li>
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree</em></ins></span> apps <span
class="removed"><del><strong>can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li><p>The Sarahah app</strong></del></span> <span
class="inserted"><ins><em>have a surveillance feature for</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording</em></ins></span> all <span class="removed"><del><strong>phone
numbers and email addresses</a></strong></del></span> <span
class="inserted"><ins><em>the users' actions</a></em></ins></span> in
<span class="removed"><del><strong>user's address
+ book to developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>interacting
with</em></ins></span> the <span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
</li>
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
+ <span class="removed"><del><strong><li>
+ <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>or
watching</a>. In addition, it may</strong></del></span>
+ be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>on Google
Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ them</em></ins></span> to <span
class="removed"><del><strong>serve</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,
+ the user interface of most of</em></ins></span> them <span
class="removed"><del><strong>with targeted
+ advertisements.</p>
+ </li>
+
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>was designed</em></ins></span> to <span
class="removed"><del><strong>do lots</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps if they
+ <p>Users should</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by</strong></del></span>
<span class="inserted"><ins><em>course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
@@ -1305,32 +1596,44 @@
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>protect their
usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon</strong></del></span> <span class="inserted"><ins><em>top
10 gratis VPN apps have lousy privacy policies</a>.</p>
<p><small>(It is unfortunate that these articles talk about
“free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.)</small></p>
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p>
</li>
<li id="M201901050">
- <p>The Weather Channel app <a
+ <p>The Weather Channel</em></ins></span> app <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
+ being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>notify the users</em></ins></span> of <span
class="removed"><del><strong>its phones. The app</strong></del></span> <span
class="inserted"><ins><em>what it</em></ins></span> will <span
class="removed"><del><strong>give Verizon</strong></del></span> <span
class="inserted"><ins><em>do
+ with</em></ins></span> the <span class="removed"><del><strong>same
+ information</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>We think that lawsuit is</em></ins></span> about <span
class="inserted"><ins><em>a side issue. What</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
+ they use its search engine.</p>
- <p>We think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>data is a secondary issue. The principal wrong
here</em></ins></span> is <span class="inserted"><ins><em>that
the company gets that data at all.</p>
<p><a
@@ -1340,73 +1643,141 @@
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>, and</strong></del></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>a Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ Facebook</em></ins></span> can <span class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>correlate</em></ins></span> the <span
class="removed"><del><strong>phone, and in server
accounts,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>same
machine via
+ various apps. Some of them send Facebook detailed information
about</em></ins></span>
+ the user's <span class="removed"><del><strong>consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>activities in the app; others only say that the
user</em></ins></span> is <span class="removed"><del><strong>inadequate
as</strong></del></span>
+ <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user
has</em></ins></span> a <span class="removed"><del><strong>protection against
massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users</em></ins></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android <a
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what radio and TV programs</strong></del></span>
<span class="inserted"><ins><em>Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn
off the other kinds of location
+ tracking, but most</em></ins></span> users <span
class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>will be tricked by the misleading
control.</p></em></ins></span>
</li>
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming</em></ins></span> app <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect it implements DRM, too—that there is no way to
save
- a recording. But we can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no
way</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>picture</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>If</em></ins></span> you <span class="removed"><del><strong>take
according</strong></del></span> <span
class="inserted"><ins><em>learn</em></ins></span> to <span
class="removed"><del><strong>who
+ is</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ of</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users'
pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
+ Android by</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
+ and</em></ins></span> the proprietary <span
class="removed"><del><strong>software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary</strong></del></span> apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>by
getting</em></ins></span> apps <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed.</strong></del></span> <span class="inserted"><ins><em>free
software
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>at
least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>others
do.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
</li>
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
@@ -1575,7 +1946,7 @@
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read</em></ins></span> logs
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
@@ -1586,57 +1957,14 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display ads. Uses
- roughly <span class="removed"><del><strong>5</strong></del></span> <span
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it
redirects the user's
+ roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5 tracking libraries. Developers of this app
have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable</strong></del></span>
- <span class="inserted"><ins><em>five</em></ins></span> tracking <span
class="removed"><del><strong>libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends</strong></del></span> <span
class="inserted"><ins><em>libraries. Developers of this</em></ins></span> app
<span class="removed"><del><strong>developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>have confirmed that</em></ins></span>
- the <span class="removed"><del><strong>personal
details</strong></del></span> <span class="inserted"><ins><em>non-premium
version</em></ins></span> of <span class="removed"><del><strong>users that
install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
- tracking</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>user and displaying
ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
</li>
@@ -1650,67 +1978,43 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to
who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
- <span class="inserted"><ins><em>in the frame.</p>
-
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>require
online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
-what they</strong></del></span> <span
class="inserted"><ins><em>pictures</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>likely to be
- sent across</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's
servers</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
-place!</p>
-</li>
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
- <li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
-
- <p>Even</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
- even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable</strong></del></span> <span
class="inserted"><ins><em>service.</p>
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the service.</p>
</li>
<li id="M201605310">
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them</em></ins></span>
with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
- advertisements.</p></em></ins></span>
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
</li>
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604250">
+ <li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
+ spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
- <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>TV programs
- are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>post
on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ <p>Apps that include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
- <p>“Cryptic</em></ins></span> communication,”
+ <li id="M201511190">
+ <p>“Cryptic communication,”
unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -1719,7 +2023,7 @@
“free”—they are not free software. The clear way
to say “zero price” is “gratis.”</p>
- <p>The article <span
class="removed"><del><strong>takes</strong></del></span> <span
class="inserted"><ins><em>takes for granted that the usual analytics tools are
+ <p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
@@ -1759,355 +2063,182 @@
<p>The article confusingly describes gratis apps as
“free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>granted</strong></del></span> that <span
class="removed"><del><strong>the usual analytics tools are
- legitimate, but</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
- is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p></em></ins></span>
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android apps (but not <a
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
- </li>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
+ <li id="M201504060">
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
+ the phone.</p>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ <p>Don't be distracted by the question of whether the app developers
+ get users to say “I agree”. That is no excuse for
+ malware.</p>
</li>
-</ul>
+ <li id="M201411260">
+ <p>Many proprietary apps for mobile devices
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p>
+ </li>
+
+ <li id="M201401150.1">
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
+ </li>
+
+ <li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers</a>.</p>
+ </li>
+ <li id="M201312060">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies</a>.</p>
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
+ </li>
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
+<ul class="blurbs">
+ <li id="M201908151">
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ on calls</a>.</p>
+
+ <p>That almost certainly means it can do so.</p>
</li>
- <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p>
+ <li id="M201307110">
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ Microsoft changed Skype <a
+
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
+</ul>
- <li><p>Apple proposes</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504060">
- <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>user</a>. This</em></ins></span> is <span
class="inserted"><ins><em>in addition to
- the</em></ins></span> snooping <span class="removed"><del><strong>on
- them.</p></li>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span class="inserted"><ins><em>done by the
phone company, and perhaps by the OS in
- the phone.</p>
+<ul class="blurbs">
+ <li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had <a
+
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to the recordings</a>.</p>
- <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can</strong></del></span> <span class="inserted"><ins><em>whether the
app developers</em></ins></span>
- get <span class="removed"><del><strong>them from
there.</p></strong></del></span> <span class="inserted"><ins><em>users to
say “I agree”. That is no excuse for
- malware.</p></em></ins></span>
+ <p>Morally, we see no difference between having human workers listen
and
+ having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411260">
- <p>Many proprietary apps for mobile devices
- report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in</em></ins></span> a <span
class="removed"><del><strong>server every phone number</strong></del></span>
<span class="inserted"><ins><em>way</em></ins></span> that <span
class="removed"><del><strong>the user types into it</a>; the server
records these numbers for</strong></del></span> at least <span
class="removed"><del><strong>30
- days.</p>
+ <li id="M201806240">
+ <p>Red Shell is a spyware that
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>is visible</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
- as bad as what</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>others do.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version</em></ins></span> of
<span class="removed"><del><strong>the most popular iOS
apps</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>restrict</em></ins></span> the <span
class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed</strong></del></span>
- <span class="inserted"><ins><em>use of data</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>user's computer,
but</em></ins></span> it <span class="removed"><del><strong>still counts as
a</strong></del></span> <span class="inserted"><ins><em>does</em></ins></span>
surveillance <span class="removed"><del><strong>functionality.</p>
-
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>too:</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</em></ins></span> to get <span class="removed"><del><strong>at
them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing is,
- and get</strong></del></span> <span class="inserted"><ins><em>user's
list of</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>people's
phone
- numbers</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312060">
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6,</strong></del></span> <span
class="inserted"><ins><em>companies</a>.</p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer</em></ins></span> but
<span class="inserted"><ins><em>did not ask
- about sending</em></ins></span> it
- <span class="removed"><del><strong>is still true in iOS
7.)</p></strong></del></span> <span class="inserted"><ins><em>to other
companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would
not.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212100">
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul class="blurbs">
- <li id="M201908151">
- <p>Skype refuses to say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
- on <span class="removed"><del><strong>all the data in an iThing,
- or</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
-
- <p>That almost certainly means</em></ins></span> it <span
class="removed"><del><strong>is totally
incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>can do so.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is
the</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307110">
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype <a
-
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></em></ins></span>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
-</div>
-
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is
pervasive</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google</strong></del></span>
<span class="inserted"><ins><em>had</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to</em></ins></span> the <span
class="removed"><del><strong>phone has</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
-
- <p>Morally, we see</em></ins></span> no <span
class="removed"><del><strong>SIM card</a>.</p></li>
-
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with</strong></del></span> <span
class="inserted"><ins><em>difference between having human workers listen and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
- </li>
-
- <li id="M201806240">
- <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
- </li>
-
- <li id="M201804144">
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>the massive
- multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>turn the
phones</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p>
+ <li id="M201804144">
+ <p>ArenaNet surreptitiously installed a spyware
+ program along with an update to the massive
+ multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information</em></ins></span> to <span class="removed"><del><strong>the
microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ information to China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p>
- </li>
-
- <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
- <span class="inserted"><ins><em>a nonfree operating system.</p>
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
- <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span class="inserted"><ins><em>merge
the data
- collected by various cr…apps</em></ins></span> and <span
class="removed"><del><strong>they send so much</strong></del></span> <span
class="inserted"><ins><em>sites made by different
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this</em></ins></span> data <span
class="removed"><del><strong>that their transmission is a
- substantial expense</strong></del></span> <span
class="inserted"><ins><em>to manipulate people to buy things, and
hunt</em></ins></span> for <span class="removed"><del><strong>users. Said
transmission, not wanted or
- requested by the user, clearly must constitute
spying</strong></del></span>
- <span class="inserted"><ins><em>“whales” who can be led to
spend a lot</em></ins></span> of <span class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
- use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
+ <p>They use this data to manipulate people to buy things, and hunt
for
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span> <span class="inserted"><ins><em>cost
money</em></ins></span>
- can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
</li>
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
- to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
+ <li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on
- <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to</strong></del></span> <span class="inserted"><ins><em>sniffs a
- good deal of personal data</a>, including lots of activities
which</em></ins></span>
- have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
+ spies on every process running on a gamer's computer and sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -2125,102 +2256,63 @@
<p>Don't be a sucker—reject all the stings.</p>
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that the article uses the term
<a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
-don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
-before <span class="removed"><del><strong>and after
going</strong></del></span> <span class="inserted"><ins><em>Amazon
“smart” TVs.</p>
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M202006250">
- <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
-
- <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
- every <span
class="removed"><del><strong>move</a>.</p></strong></del></span>
<span class="inserted"><ins><em>second of what the user is watching</a>.
This is illegal due to
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p></em></ins></span>
+ it through EULAs.</p>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ <li id="M201901070">
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO,</em></ins></span> and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span class="inserted"><ins><em>this
data is sold to third parties. This is</em></ins></span> in <span
class="removed"><del><strong>user's address
- book</strong></del></span> <span class="inserted"><ins><em>return for
+ CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note
that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>spying
acceptable, according</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
- </li>
-
- <li>
- <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>him,
+ <p>What is supposed to make this spying acceptable, according to him,
is that it is opt-in in newer models. But since the Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
<p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
- to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which
can</em></ins></span>
- be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>an old
computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>serve
them</strong></del></span> <span class="inserted"><ins><em>block connections to
Vizio's servers. Or, as a last resort,
- you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>another model.</p></em></ins></span>
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span class="removed"><del><strong>its
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to
Netflix.</em></ins></span> The <span
class="inserted"><ins><em>Netflix</em></ins></span> app <span
class="removed"><del><strong>will give Verizon the same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em><a
+ moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2228,87 +2320,44 @@
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app</strong></del></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span>
and
- <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>image is coming
from</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
- the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
- still spyware.</p>
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>way to disable</em></ins></span> the <span
class="removed"><del><strong>phone, and in server
accounts,</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if</em></ins></span> it
<span class="removed"><del><strong>can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate</strong></del></span> <span
class="inserted"><ins><em>were not hidden</em></ins></span> as <span
class="removed"><del><strong>a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it was in these TVs,
- does not legitimize the surveillance.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511130">
- <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
- sounds to be picked up by proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>various sites
- such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+ your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
- <span class="inserted"><ins><em>across devices.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>company
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>new combined
surveillance by default.</p>
+ users to new combined surveillance by default.</p>
</li>
<li id="M201507240">
@@ -2320,604 +2369,591 @@
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> even <span
class="removed"><del><strong>if the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>what they
wanted</em></ins></span> to <span class="removed"><del><strong>the
service.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span>
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on
what</em></ins></span>
- users <span class="removed"><del><strong>submit</strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p>
+ used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on <span class="removed"><del><strong>the user</a>. This is in
addition to
+ the snooping done by the phone company, and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question of whether the app
developers get</strong></del></span> <span
class="inserted"><ins><em>what</em></ins></span>
+ users <span class="removed"><del><strong>to say “I agree”.
That is no excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
- <li id="M201502090">
- <p>The Samsung “Smart” TV <a
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized this app
because it asked</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
- Nuance can save it</em></ins></span> and <span
class="inserted"><ins><em>would then have to give it to the US
or</em></ins></span> some
- <span class="removed"><del><strong>are starting</strong></del></span>
- <span class="inserted"><ins><em>other government.</p>
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>another company,
Nuance</a>.
+ Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> it to <span
class="removed"><del><strong>other companies. This shows the
+ weakness of</strong></del></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
+
+ <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>anyone? A</strong></del></span> <span
class="inserted"><ins><em>be trusted unless it is done by</em></ins></span> free
+ software <span class="removed"><del><strong>flashlight
+ app would not.</p>
+ </li>
+</ul>
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>be trusted unless</em></ins></span> it is <span
class="removed"><del><strong>nasty.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span class="inserted"><ins><em>done
by free
- software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span class="removed"><del><strong>they
present</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
- parties</a>.</p>
+<ul>
+
+ <li>
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
+
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>listen in
on a child's speech, and even speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>third
+ parties</a>.</p></em></ins></span>
</li>
- <li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
- snooping <span class="inserted"><ins><em>all the time</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411090">
+ <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
+ snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their users</a>.</p></em></ins></span>
- <p>The report was</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>of 2014, but we don't expect this has got
+ <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>get users' formal
+ <p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed
to</em></ins></span> report <span class="removed"><del><strong>which other
- apps</strong></del></span> <span class="inserted"><ins><em>what the
- user watches—no exceptions!</p>
+ <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the user <span
class="inserted"><ins><em>watches, and the switch to turn this
off</em></ins></span> has
- <span class="removed"><del><strong>installed.</strong></del></span>
- <span class="inserted"><ins><em>no effect</a>. (The fact that the
transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
-
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span class="removed"><del><strong>data
may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission
reports</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>404 error
+ really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data <span
class="removed"><del><strong>broker would have been able</strong></del></span>
<span class="inserted"><ins><em>anyway.)</p>
+
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>way.</p>
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who the user was.</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
</li>
- <li id="M201212170">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found</em></ins></span> a way <span
class="removed"><del><strong>that at least is visible</strong></del></span>
<span class="inserted"><ins><em>to break security on a “smart”
TV</a></em></ins></span>
- and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>use its camera to
watch</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
- </li>
+ Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-<span class="inserted"><ins><em></ul>
+<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span <span class="removed"><del><strong>class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li>
+ <p>An LG “smart” watch is designed</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon
servers</a>, which save it
+ send the video they capture</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone
that comes near, or merely
- passes by,</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
-
- <p>The article focuses on how Ring used to let individual employees
look
- at</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
- secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
- users</strong></del></span>
- <span class="inserted"><ins><em>video—Amazon expects
society</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>surrender to.</p></em></ins></span>
+ <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>someone else and</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
+ at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>transmit
+ conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
<span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span>
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>asked the user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>videos. That's</em></ins></span> not
- <span class="removed"><del><strong>ask about sending
it</strong></del></span>
- <span class="inserted"><ins><em>security for your home. Security means
making sure they don't get</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
- weakness</strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>these
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>watch through them</a>.</p>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
+ <li id="M201511250"></em></ins></span>
+ <p>The <span class="removed"><del><strong>article says
this</strong></del></span> <span class="inserted"><ins><em>Nest Cam
“smart” camera</em></ins></span> is <span
class="removed"><del><strong>a back door, but that could be a
+ misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ even when the “owner” switches</em></ins></span> it <span
class="inserted"><ins><em>“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+ <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>using it
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-
- <li></strong></del></span>
+<li><p></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it
into one.</p>
</li>
- <li id="M201711100"></em></ins></span>
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into the toys themselves.</p>
- </li>
-
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
+ <li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers</em></ins></span> found a way to access the data</a>
collected by the
- manufacturer's snooping.</p>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
- <p>That the manufacturer and the FBI could listen to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
</ul>
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<div style="clear: left;"></div>
<ul>
- <li>
- <p>An LG “smart” watch is designed
- <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to
transmit</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span>
- conversations <span
class="removed"><del><strong>too</a>.</p></strong></del></span>
<span class="inserted"><ins><em>was unacceptable by
itself.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site in China</a>.</p>
- <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>back door, but that could
be</strong></del></span> <span class="inserted"><ins><em>speech recognition
- company based in the U.S.</p>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>doesn't really matter. If it had sold the data to a
data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with</em></ins></span> a
- <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
- least.</p>
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>mobile phone. This would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of
C$4m</a></em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
-
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> on <span
class="removed"><del><strong>Windows installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>child's
speech, and even speak into the
- toys themselves.</p>
+ <li>
+ <p>Every “home security” camera,
if</strong></del></span> its <span class="removed"><del><strong>manufacturer
can communicate</strong></del></span>
+ <span class="inserted"><ins><em>customers.</p>
</li>
- <li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
+ <li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>it,
+ is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>fact
+ that</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>device is tethered to a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But it also demonstrates that</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span
class="removed"><del><strong>company
+ surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ conversations was unacceptable by itself.</p></em></ins></span>
+ </li>
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <span class="removed"><del><strong><li></strong></del></span>
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <span class="inserted"><ins><em><li id="M201612060"></em></ins></span>
+ <p>The <span class="removed"><del><strong>Nest
Cam</strong></del></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and</em></ins></span> even
<span class="removed"><del><strong>when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
+ </li>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>Spyware</strong></del></span>
+ <li><p>E-books can contain JavaScript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
+ to snoop</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
+<li><p>Computerized cars with</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
+ <p>Many employers are using</em></ins></span> nonfree <span
class="removed"><del><strong>software</strong></del></span>
+ <span class="inserted"><ins><em>software, including videoconference
software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that</em></ins></span> is <span
class="inserted"><ins><em>in effect</em></ins></span> a <span
class="inserted"><ins><em>malicious</em></ins></span>
- surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>feature.</p>
+ whether you</em></ins></span> are <span
class="inserted"><ins><em>“active,” that is in effect a malicious
+ surveillance feature.</p>
</li>
<li id="M202008030">
- <p>Google Nest</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
+ <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
update to its speaker devices using their back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
- that</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the
<span class="removed"><del><strong>manufacturer, based on</strong></del></span>
<span class="inserted"><ins><em>devices now listen for more
- than just their wake words. Google says</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>software update was sent
+ that an alarm is happening. This means the devices now listen for more
+ than just their wake words. Google says the software update was sent
out prematurely and on accident and Google was planning on disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
- <p>“Bossware” is malware</em></ins></span> that <span
class="inserted"><ins><em>bosses <a
+ <p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span>
- <span class="inserted"><ins><em>bosses can spy on them.</p>
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on them.</p>
- <p>This shows why requiring the user's
“consent”</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not
+ <p>This shows why requiring the user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>almost
anything, even probable exposure
+ most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ be illegal and bosses that demand it should be prosecuted for
it.</p></em></ins></span>
</li>
- <li id="M201911190">
- <p>Internet-tethered Amazon Ring had
- a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>household
- through connected surveillance devices.</p>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201911190">
+ <p>Internet-tethered Amazon Ring had</em></ins></span>
+ a <span class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"></em></ins></span>
+ access <span class="removed"><del><strong>its computers
remotely</strong></del></span> <span class="inserted"><ins><em>the user's wifi
password</a>,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>household</em></ins></span>
+ through <span class="inserted"><ins><em>connected surveillance
devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>if the devices implemented proper
+ <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>modem. However, even</strong></del></span> <span
class="inserted"><ins><em>wifi password would not be sufficient to carry
+ out any significant surveillance</em></ins></span> if <span
class="removed"><del><strong>it asked</strong></del></span> <span
class="inserted"><ins><em>the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p></em></ins></span>
+ manufacturers</em></ins></span> for
+ <span class="removed"><del><strong>authentication, you couldn't be
confident that Nissan has</strong></del></span> <span
class="inserted"><ins><em>snooping.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner”
switches</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
+ <li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
-
- <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>person's
voice. It should only
- get commands that</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
- </li>
-
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
- accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
- even if <span class="removed"><del><strong>it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
+ <p>Since Google “Assistant” uses proprietary software,
there is</em></ins></span> no
+ <span class="removed"><del><strong>access. The software
in</strong></del></span>
+ <span class="inserted"><ins><em>way to see or control what it records or
sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
+
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than</em></ins></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends</em></ins></span>
+ it <span class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+
+ <p>Even</strong></del></span> <span class="inserted"><ins><em>to
Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even</em></ins></span> if <span class="removed"><del><strong>no one
connects</strong></del></span> <span class="inserted"><ins><em>users request
deletion of their data from Amazon's servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
+ the data remain on other servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest
thermostat,</em></ins></span> the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>Philips
- Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span>
the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>phone company</strong></del></span>
<span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span>
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made
available</em></ins></span> to
<span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>time; it is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>past (and, who
knows,
- in</em></ins></span> the <span class="removed"><del><strong>cell phone
modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>future too?)</p></em></ins></span>
+ at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201904240">
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>listen
to</a>. The Google</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>Apple
+ <li id="M201904240">
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>the Alexa
service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
- tell you how</em></ins></span> and <span
class="removed"><del><strong>should be replaced</strong></del></span> <span
class="inserted"><ins><em>where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates</em></ins></span> with <span
class="removed"><del><strong>anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>HP servers</a> to make sure</em></ins></span>
the <span class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>user is still
- paying for</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>ink subscription
program may be cheaper in some
- specific cases, it spies on users,</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>involves totally unacceptable
- restrictions in</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon
device,</em></ins></span>
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="removed"><del><strong>doesn't
store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
@@ -3014,17 +3050,29 @@
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws.</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a></em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>unauthorized people,</em></ins></span>
+ and <span class="removed"><del><strong>cable</a>. Even if the image
is coming</strong></del></span> <span class="inserted"><ins><em>can send
messages</em></ins></span> from <span class="inserted"><ins><em>unauthorized
devices.</p>
+
+ <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>user's own
+ computer, the TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="inserted"><ins><em>connects to an unidentified site in
China</a>.</p>
-
- <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence
of</strong></del></span> a <span class="removed"><del><strong>way to
- disable the surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>back door, but that
could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>was in
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+
+ <p>The article says this is a back door, but that could
be</em></ins></span> a <span class="removed"><del><strong>way to
+ disable the surveillance, even if it were not hidden
as</strong></del></span>
+ <span class="inserted"><ins><em>misunderstanding.
However,</em></ins></span> it <span class="removed"><del><strong>was in
these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>is certainly surveillance, at
least.</p></em></ins></span>
</li>
@@ -3775,7 +3823,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:29 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.344
retrieving revision 1.345
diff -u -b -r1.344 -r1.345
--- po/proprietary-surveillance.de.po 7 Oct 2020 17:02:20 -0000 1.344
+++ po/proprietary-surveillance.de.po 16 Oct 2020 11:32:29 -0000 1.345
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -4780,6 +4780,34 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+word “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
+# | “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- po/proprietary-surveillance.es.po 8 Oct 2020 08:59:04 -0000 1.84
+++ po/proprietary-surveillance.es.po 16 Oct 2020 11:32:29 -0000 1.85
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-10-08 10:33+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -4246,6 +4247,34 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
+"philosophy/free-sw.html\">software libre</a>” para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.541
retrieving revision 1.542
diff -u -b -r1.541 -r1.542
--- po/proprietary-surveillance.fr.po 7 Oct 2020 20:29:14 -0000 1.541
+++ po/proprietary-surveillance.fr.po 16 Oct 2020 11:32:29 -0000 1.542
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-10-07 21:58+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -4253,6 +4254,34 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Notez que cet article emploie à mauvais escient l'expression "
+"<cite><a href=\"/philosophy/free-sw.html\">free software</a></cite> dans le "
+"sens de « logiciel gratuit ».)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/proprietary-surveillance.it-diff.html 7 Oct 2020 17:02:20 -0000
1.196
+++ po/proprietary-surveillance.it-diff.html 16 Oct 2020 11:32:29 -0000
1.197
@@ -1993,19 +1993,16 @@
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="inserted"><ins><em>only hope that they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that</em></ins></span> track <span
class="removed"><del><strong>you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by
TV
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -2894,9 +2891,10 @@
listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
+ a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially spying
on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ about</em></ins></span> you
+ <span class="removed"><del><strong>across</strong></del></span> <span
class="inserted"><ins><em>for later examination.</p>
</li>
<li id="M201407170">
@@ -2933,6 +2931,21 @@
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized</em></ins></span>
devices.</p>
+
+ <span class="removed"><del><strong><p>It is
possible</strong></del></span>
+
+ <span class="inserted"><ins><em><p><small>(Note that this
article misuses the word “<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”</em></ins></span>
+ to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>mean “crackers.”)</small></p>
+ </li>
+
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
@@ -3620,7 +3633,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:29 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- po/proprietary-surveillance.it.po 7 Oct 2020 17:02:20 -0000 1.356
+++ po/proprietary-surveillance.it.po 16 Oct 2020 11:32:29 -0000 1.357
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -4496,6 +4496,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- po/proprietary-surveillance.ja-diff.html 7 Oct 2020 17:02:20 -0000
1.214
+++ po/proprietary-surveillance.ja-diff.html 16 Oct 2020 11:32:29 -0000
1.215
@@ -1406,90 +1406,45 @@
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even though the
- data is “anonymized</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>aggregated,”
it can easily be
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>insurance
companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
traced back to the woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app</em></ins></span> that <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>same
thing without
+ free-software app that does more or less the same thing without
spying on you is available from <a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>new
one</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>being
developed</a>.</p>
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
<p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ running Google apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the phone has</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending
+ <p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to the data. This
results in massive
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found that
19</em></ins></span> of <span class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>them <a
+ <p>A study of 24 “health” apps found that 19 of them
<a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can
use</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people</em></ins></span> in <span class="removed"><del><strong>Cisco
TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>poor
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
@@ -2321,15 +2276,17 @@
Crackers found a way to break security on a “smart”
TV</a>
and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
@@ -2372,18 +2329,22 @@
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
into one.</p>
@@ -2398,7 +2359,8 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>its users through
the proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
@@ -2409,18 +2371,21 @@
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
+ <p>The company</em></ins></span> that <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
+ was sued for collecting lots of personal information about how
people</em></ins></span>
+ used <span class="removed"><del><strong>did not affect
+GNU/Linux; also, a “clean” Windows install is
not</strong></del></span> <span
class="inserted"><ins><em>it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
+ true, but it doesn't</em></ins></span> really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of C$4m</a> to its
customers.</p>
</li>
@@ -2445,53 +2410,79 @@
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009270">
<p>Many employers are using nonfree
software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
+ whether you are “active,” that is</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>effect a malicious
surveillance feature.</p>
</li>
<li id="M202008030">
- <p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ update to its speaker devices using their back door</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
@@ -2523,217 +2514,218 @@
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p></em></ins></span>
+ manufacturers</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em><li id="M201907210">
- <p>Google “Assistant” records users' conversations <a
-
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
+ <p>Google “Assistant” records users'
conversations</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
+ when <span class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
- <p>Rather than trying to better control the use of recordings, Google
+ <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
- <li id="M201905061">
+ <span class="inserted"><ins><em><li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="inserted"><ins><em>sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>,
where</em></ins></span> they <span class="removed"><del><strong>report even
which page</strong></del></span> <span class="inserted"><ins><em>can be
accessed by
advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
+ deleting</em></ins></span> the <span class="removed"><del><strong>user
reads</strong></del></span> <span class="inserted"><ins><em>collected
information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
+ Alexa. As a result, Amazon has a very precise picture of users'
life</em></ins></span>
+ at <span class="removed"><del><strong>what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>home, not only in the present, but in the past (and,
who knows,
+ in the future too?)</p></em></ins></span>
</li>
- <li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904240">
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>Alexa service are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>the Alexa service staff even has
access</em></ins></span> to <span class="removed"><del><strong>Adobe</a>.
Adobe's “excuse”:</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
<p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ tell you how and where</em></ins></span> it's
+ <span class="removed"><del><strong>needed</strong></del></span> <span
class="inserted"><ins><em>done”), users have no way</em></ins></span>
+ to <span class="removed"><del><strong>check DRM!</p>
</li>
+</ul>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
- paid for.</p>
-
- <p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions</em></ins></span> in <span
class="removed"><del><strong>Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise
be</em></ins></span> in <span class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span class="inserted"><ins><em>working order.</p>
- </li>
-
- <li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a></em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>know what happens to
the recordings unless human eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
-</ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span>
- <p>It was very difficult for them</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <span class="inserted"><ins><em><li id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>do this.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>That's easy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+ paying</em></ins></span> for
+ <span class="removed"><del><strong>authentication, you
couldn't</strong></del></span> <span class="inserted"><ins><em>the
subscription, and hasn't printed more pages than were
+ paid for.</p>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <p>Even though the ink subscription program may</em></ins></span> be
<span class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>would otherwise be</em></ins></span> in
+ <span class="inserted"><ins><em>working order.</p>
+ </li>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>“owner”
switches it “off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>product in that country,
- do you think Amazon would have the moral fiber</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span class="inserted"><ins><em>say
no?</p>
+ <li id="M201808120">
+ <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
+ and</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn</em></ins></span> it <span class="removed"><del><strong>demands blind
faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>moral fiber to say no?</p>
<p><small>(These crackers are probably hackers too, but please
<a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.)</small></p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-<ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that</em></ins></span> snoops on
<span
class="removed"><del><strong>readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
+ <li id="M201804140">
+ <p>A medical insurance</em></ins></span> company <span
class="inserted"><ins><em><a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
+ <li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>user reads at what</strong></del></span>
time</a>.</p>
+ listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>car's movements</strong></del></span> <span
class="inserted"><ins><em>house,</em></ins></span> all the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
- <span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
+ <p>Today's technological practice does not include any way of making
a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
+ on you. Even if</em></ins></span> it is <span
class="removed"><del><strong>possible to physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
about you for later examination.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></strong></del></span>
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
<span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers</em></ins></span> send
<span class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of
- data <span class="inserted"><ins><em>about the user</a>.</p>
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
+ data</em></ins></span> about <span class="removed"><del><strong>drivers'
movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>spy on their
renters</a>.</p></em></ins></span>
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
- effectively
- anyone</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because the system has no authentication when
- accessed through</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>sheeple to find</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>normal</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in the car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>companies
- monitor every aspect of what they do.</p>
+ <p>This will teach the sheeple to find it normal that companies
+ monitor every aspect</em></ins></span> of <span
class="inserted"><ins><em>what they do.</p>
</li>
</ul>
@@ -2741,36 +2733,35 @@
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
- <li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that</em></ins></span> connects to <span class="removed"><del><strong>the
car remotely, the cell phone
- modem enables the phone company to track the car's movements all
- the time; it is possible to physically remove the cell phone modem
- though.</p>
+ <li id="M202009100">
+ <p>Internet-enabled watches with</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span>
+ are <span class="removed"><del><strong>an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>malware, violating people (specially children's)
+ privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>security
breakers</a></em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
</li>
- <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>an unidentified site</em></ins></span> in <span
class="removed"><del><strong>cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in</strong></del></span> <span
class="inserted"><ins><em>article says</em></ins></span> this <span
class="removed"><del><strong>article,</strong></del></span> is <span
class="removed"><del><strong>not
- really</strong></del></span> a <span class="removed"><del><strong>matter
of proprietary surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
+ <li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The
company</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
- <li><p>Tesla cars allow the company to extract data remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information,</strong></del></span> <span
class="inserted"><ins><em>back door,</em></ins></span> but <span
class="removed"><del><strong>if the state orders it to get the data
- and hand</strong></del></span> <span class="inserted"><ins><em>that
could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>is
certainly surveillance, at least.</p></em></ins></span>
+ <p>The article</em></ins></span> says <span
class="removed"><del><strong>it doesn't
+ store</strong></del></span> this <span
class="removed"><del><strong>information,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>if the state orders it to get the data
+ and hand it over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>that could
be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -3458,7 +3449,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:29 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- po/proprietary-surveillance.ja.po 7 Oct 2020 17:02:20 -0000 1.338
+++ po/proprietary-surveillance.ja.po 16 Oct 2020 11:32:29 -0000 1.339
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -3555,6 +3555,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- po/proprietary-surveillance.pot 7 Oct 2020 17:02:20 -0000 1.277
+++ po/proprietary-surveillance.pot 16 Oct 2020 11:32:29 -0000 1.278
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -2864,6 +2864,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
"
+"permit access by security breakers</a> and unauthorized people, and can send "
+"messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean "
+"“crackers.”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a "
"href=\"https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\">
"
"that connects to an unidentified site in China</a>."
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.633
retrieving revision 1.634
diff -u -b -r1.633 -r1.634
--- po/proprietary-surveillance.ru.po 8 Oct 2020 09:59:31 -0000 1.633
+++ po/proprietary-surveillance.ru.po 16 Oct 2020 11:32:30 -0000 1.634
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -4209,6 +4210,35 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(ÐбÑаÑаем ваÑе внимание, ÑÑо в ÑÑой
ÑÑаÑÑе вÑÑажение “<a href="
+"\"/philosophy/free-sw.html\"><span lang=\"en\" xml:lang=\"en\">free "
+"software</span></a>” невеÑно иÑполÑзÑеÑÑÑ Ð´Ð»Ñ
обознаÑÐµÐ½Ð¸Ñ Ð±ÐµÑплаÑнÑÑ
"
+"пÑогÑамм.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- po/proprietary.de-diff.html 7 Oct 2020 17:02:20 -0000 1.179
+++ po/proprietary.de-diff.html 16 Oct 2020 11:32:30 -0000 1.180
@@ -58,8 +58,9 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -125,20 +125,20 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -155,16 +155,16 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -212,6 +212,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into <a
@@ -243,13 +256,6 @@
on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
-
- <li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -312,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- po/proprietary.de.po 7 Oct 2020 17:02:20 -0000 1.219
+++ po/proprietary.de.po 16 Oct 2020 11:32:30 -0000 1.220
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+word “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
+# | “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -487,14 +515,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -653,17 +673,6 @@
#, fuzzy
#~| msgid ""
-#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
-#~ msgid ""
-#~ "Unfortunately, the article <a href=\"/philosophy/words-to-avoid."
-#~ "html#Hacker\">improperly refers to crackers as “hackers”</a>."
-#~ msgstr ""
-#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
-#~ "words-to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
-#, fuzzy
-#~| msgid ""
#~| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-"
#~| "company-has-already-logge-1795906081\"> snoop on information that users "
#~| "have typed into a form but not sent</a>."
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.324
retrieving revision 1.325
diff -u -b -r1.324 -r1.325
--- po/proprietary.es.po 8 Oct 2020 08:59:04 -0000 1.324
+++ po/proprietary.es.po 16 Oct 2020 11:32:30 -0000 1.325
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -312,6 +313,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
+"philosophy/free-sw.html\">software libre</a>” para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -363,18 +392,6 @@
"accused-watching-Instagram-users-mobile-cameras.html\">espÃa a los usuarios "
"de Instagram</a> activando a escondidas la cámara del dispositivo."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Los cascos Oculus<a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">exigen a los usuarios identificarse en Facebook</a>. Esto da a Facebook "
-"plena capacidad para espiar en todo momento a los usuarios de Oculus."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -454,3 +471,15 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Los cascos Oculus<a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">exigen a los usuarios identificarse en Facebook</a>. Esto da a "
+#~ "Facebook plena capacidad para espiar en todo momento a los usuarios de "
+#~ "Oculus."
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.365
retrieving revision 1.366
diff -u -b -r1.365 -r1.366
--- po/proprietary.fr.po 7 Oct 2020 20:00:19 -0000 1.365
+++ po/proprietary.fr.po 16 Oct 2020 11:32:30 -0000 1.366
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-10-07 21:58+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,34 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Notez que cet article emploie à mauvais escient l'expression "
+"<cite><a href=\"/philosophy/free-sw.html\">free software</a></cite> dans le "
+"sens de « logiciel gratuit ».)</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -359,18 +388,6 @@
"utilisateurs d'Instagram</a> en activant subrepticement la caméra du "
"téléphone."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera à "
-"Facebook carte blanche pour les espionner systématiquement."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -443,3 +460,14 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Le casque Oculus <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">oblige les utilisateurs à s'identifier sur Facebook</a>. Ceci donnera "
+#~ "à Facebook carte blanche pour les espionner systématiquement."
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- po/proprietary.it-diff.html 7 Oct 2020 17:02:20 -0000 1.191
+++ po/proprietary.it-diff.html 16 Oct 2020 11:32:30 -0000 1.192
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,20 +58,20 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;
+ text-decoration: none;</em></ins></span>
}
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into <a
@@ -242,13 +255,6 @@
on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
-
- <li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -311,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- po/proprietary.it.po 7 Oct 2020 17:02:20 -0000 1.228
+++ po/proprietary.it.po 16 Oct 2020 11:32:30 -0000 1.229
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -491,14 +507,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/proprietary.ja-diff.html 7 Oct 2020 17:02:20 -0000 1.196
+++ po/proprietary.ja-diff.html 16 Oct 2020 11:32:30 -0000 1.197
@@ -55,14 +55,14 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -153,15 +153,15 @@
</ul>
</td>
<td>
- <ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
@@ -209,6 +209,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into <a
@@ -240,13 +253,6 @@
on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
-
- <li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -309,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:20 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- po/proprietary.ja.po 7 Oct 2020 17:02:21 -0000 1.212
+++ po/proprietary.ja.po 16 Oct 2020 11:32:30 -0000 1.213
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -352,14 +368,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- po/proprietary.nl-diff.html 7 Oct 2020 17:02:21 -0000 1.192
+++ po/proprietary.nl-diff.html 16 Oct 2020 11:32:30 -0000 1.193
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,15 +58,15 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;
+ text-decoration: none;</em></ins></span>
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into <a
@@ -242,13 +255,6 @@
on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
-
- <li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -311,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:21 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- po/proprietary.nl.po 7 Oct 2020 17:02:21 -0000 1.202
+++ po/proprietary.nl.po 16 Oct 2020 11:32:30 -0000 1.203
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -395,14 +411,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.209
retrieving revision 1.210
diff -u -b -r1.209 -r1.210
--- po/proprietary.pl-diff.html 7 Oct 2020 17:02:21 -0000 1.209
+++ po/proprietary.pl-diff.html 16 Oct 2020 11:32:30 -0000 1.210
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -55,7 +55,7 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
@@ -63,7 +63,7 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As of September, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 540
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>September, 2020, the pages in this directory
list around 450
+instances of malicious functionalities (with more than 540 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -154,16 +154,16 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -209,6 +209,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into <a
@@ -240,13 +253,6 @@
on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
-
- <li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -309,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:21 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- po/proprietary.pl.po 7 Oct 2020 17:02:21 -0000 1.195
+++ po/proprietary.pl.po 16 Oct 2020 11:32:30 -0000 1.196
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -572,14 +588,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- po/proprietary.pot 7 Oct 2020 17:02:21 -0000 1.192
+++ po/proprietary.pot 16 Oct 2020 11:32:30 -0000 1.193
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a "
+"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">They
"
+"permit access by security breakers</a> and unauthorized people, and can send "
+"messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a "
+"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean "
+"“crackers.”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a "
"href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge\">
"
@@ -289,14 +306,6 @@
"on Instagram</a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a "
-"href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\">require
"
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary.pt-br-diff.html 11 Oct 2020 17:28:43 -0000 1.1
+++ po/proprietary.pt-br-diff.html 16 Oct 2020 11:32:30 -0000 1.2
@@ -186,32 +186,46 @@
<ul class="blurbs">
<li <span class="removed"><del><strong>id="M202007010">
- <p>BMW will remotely</strong></del></span> <span
class="inserted"><ins><em>id="M202003110">
- <p>Roblox (among many other games)
- created anti-features which sucker children into</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
- enable and disable functionality in cars</a> through a universal
- back door.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
- utilizing third-party payment services without
authorization.</a></p></em></ins></span>
+ <p>BMW will remotely <a
+ href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
+ enable and disable functionality in cars</a>
through</strong></del></span> <span
class="inserted"><ins><em>id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>universal
+ back door.</p>
</li>
- <li <span class="removed"><del><strong>id="M202006300">
- <p>“Bossware” is malware that bosses <a
-
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ <li id="M202006300">
+ <p>“Bossware” is malware that
bosses</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws.</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
coerce workers into installing in their own computers</a>, so the
bosses can spy on them.</p>
- <p>This shows why requiring the user's
“consent”</strong></del></span> <span
class="inserted"><ins><em>id="M202007270">
- <p>The Mellow sous-vide cooker</em></ins></span> is <span
class="removed"><del><strong>not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable
exposure</strong></del></span>
- <span class="inserted"><ins><em>tethered</em></ins></span> to <span
class="removed"><del><strong>contagious disease that can be fatal. Software
like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The
boss</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and</em></ins></span> can <span class="removed"><del><strong>coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contagious disease</strong></del></span> <span
class="inserted"><ins><em>send messages from unauthorized devices.</p>
+
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>can be fatal. Software like</strong></del></span>
this <span class="removed"><del><strong>should
+ be illegal and bosses that demand it should be prosecuted for
it.</p></strong></del></span> <span class="inserted"><ins><em>article
misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p></em></ins></span>
</li>
- <li id="M201504210">
- <p>Runescape is</strong></del></span> a <span
class="removed"><del><strong>popular online game with
some</strong></del></span> <span class="inserted"><ins><em>server. The company
suddenly</em></ins></span> <a
+ <li <span class="removed"><del><strong>id="M201504210">
+ <p>Runescape</strong></del></span> <span
class="inserted"><ins><em>id="M202003110">
+ <p>Roblox (among many other games)
+ created anti-features which sucker children into <a
+
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
+ utilizing third-party payment services without
authorization.</a></p>
+ </li>
+
+ <li id="M202007270">
+ <p>The Mellow sous-vide cooker</em></ins></span> is
+ <span class="inserted"><ins><em>tethered to</em></ins></span> a <span
class="removed"><del><strong>popular online game with
some</strong></del></span> <span class="inserted"><ins><em>server. The company
suddenly</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
addictive features</a> derived</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
@@ -229,39 +243,31 @@
<li <span class="removed"><del><strong>id="M202006260">
<p>Most apps</strong></del></span> <span
class="inserted"><ins><em>id="M202009270">
<p>Many employers</em></ins></span> are <span
class="removed"><del><strong>malware, but
- Trump's campaign app, like Modi's campaign app,</strong></del></span>
<span class="inserted"><ins><em>using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that</em></ins></span> is <span
class="inserted"><ins><em>in effect a malicious
- surveillance feature.</p>
- </li>
-
- <li id="M202009183">
- <p>Facebook</em></ins></span> <a
+ Trump's campaign app, like Modi's campaign app, is</strong></del></span>
<span class="inserted"><ins><em>using nonfree
+ software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops</em></ins></span>
- on <span class="inserted"><ins><em>Instagram</a></em></ins></span>
users <span class="removed"><del><strong>as well
- as snooping</strong></del></span> <span class="inserted"><ins><em>by
surreptitously turning</em></ins></span> on <span
class="removed"><del><strong>them itself</a>.</p>
+ especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
approach, but that does not tell us whether it has functionalities we
- consider malicious, such as sending data</strong></del></span> the <span
class="removed"><del><strong>user has not explicitly
- asked to send.</p></strong></del></span> <span
class="inserted"><ins><em>device's
- camera.</p></em></ins></span>
+ consider malicious, such as sending data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ surveil and monitor staff working at home</a>. If</em></ins></span>
the <span class="removed"><del><strong>user has not explicitly
+ asked to send.</p></strong></del></span> <span
class="inserted"><ins><em>program reports
+ whether you are “active,” that is in effect a malicious
+ surveillance feature.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M202006250">
- <p>TV manufacturers are able to</strong></del></span> <span
class="inserted"><ins><em>id="M202008182">
- <p>Oculus headsets</em></ins></span> <a
+ <p>TV manufacturers are able to</strong></del></span> <span
class="inserted"><ins><em>id="M202009183">
+ <p>Facebook</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>.</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>.</em></ins></span> This
<span class="removed"><del><strong>is illegal due</strong></del></span> <span
class="inserted"><ins><em>will give Facebook
- free rein</em></ins></span> to
- <span class="removed"><del><strong>the Video Privacy Protection Act of
1988, but they're circumventing
- it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus
users.</p></em></ins></span>
+ every second of what the user is watching</a>. This is illegal due
to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a> users by surreptitously turning
on</em></ins></span> the <span class="removed"><del><strong>Video Privacy
Protection Act of 1988, but they're circumventing
+ it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>device's
+ camera.</p></em></ins></span>
</li>
</ul>
@@ -324,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/11 17:28:43 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- po/proprietary.pt-br.po 7 Oct 2020 17:02:21 -0000 1.327
+++ po/proprietary.pt-br.po 16 Oct 2020 11:32:30 -0000 1.328
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -311,6 +311,28 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
+"sentido de âgrátisâ.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -343,14 +365,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -714,13 +728,6 @@
#~ "usar o software livre."
#~ msgid ""
-#~ "<small>Note: this article uses the word “free” in the sense "
-#~ "of “gratis.”</small>"
-#~ msgstr ""
-#~ "<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â
no "
-#~ "sentido de âgrátisâ.</small>"
-
-#~ msgid ""
#~ "Some Avast and AVG extensions for Firefox and Chrome were found to <a "
#~ "href=\"https://www.itpro.co.uk/security/internet-security/354417/avast-"
#~ "and-avg-extensions-pulled-from-chrome\"> snoop on users' detailed "
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.400
retrieving revision 1.401
diff -u -b -r1.400 -r1.401
--- po/proprietary.ru.po 8 Oct 2020 09:59:31 -0000 1.400
+++ po/proprietary.ru.po 16 Oct 2020 11:32:30 -0000 1.401
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,33 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-<small>Note:-]{+<small>(Note that+} this article [-uses-] {+misuses+}
+# | the word [-“free” in the sense of
+# | “gratis.”</small>-] {+“<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
+# | “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе Ñлово
“ÑвободнÑй” "
+"иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле
“беÑплаÑнÑй”.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -362,18 +390,6 @@
"accused-watching-Instagram-users-mobile-cameras.html\">подглÑдÑваеÑ
за "
"полÑзоваÑелÑми Instagram</a>, ÑкÑÑÑно вклÑÑаÑ
камеÑÑ ÑÑÑÑойÑÑва."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"ÐаÑниÑÑÑÑ Occulus <a
href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
иденÑиÑиÑиÑовалиÑÑ Ð½Ð° Facebook</a>. ÐÑо "
-"Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ Facebook наблÑдаÑÑ Ð·Ð°
полÑзоваÑелÑми Occulus, ÑколÑко дÑÑе Ñгодно."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -450,6 +466,18 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "ÐаÑниÑÑÑÑ Occulus <a
href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
иденÑиÑиÑиÑовалиÑÑ Ð½Ð° Facebook</a>. ÐÑо "
+#~ "Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ Facebook наблÑдаÑÑ Ð·Ð°
полÑзоваÑелÑми Occulus, ÑколÑко дÑÑе "
+#~ "Ñгодно."
+
+#~ msgid ""
#~ "Apple is <a href=\"https://www.theguardian.com/technology/2020/aug/30/"
#~ "this-isnt-the-1990s-apple-under-pressure-from-app-developers\"> putting "
#~ "the squeeze on all business</a> conducted through apps for iMonsters."
@@ -2239,13 +2267,6 @@
#~ "ÑвободнÑми пÑогÑаммами."
#~ msgid ""
-#~ "<small>Note: this article uses the word “free” in the sense "
-#~ "of “gratis.”</small>"
-#~ msgstr ""
-#~ "<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе
Ñлово “ÑвободнÑй” "
-#~ "иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле
“беÑплаÑнÑй”.</small>"
-
-#~ msgid ""
#~ "iMonsters and Android phones, when used for work, give employers powerful "
#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-"
#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/proprietary.tr.po 7 Oct 2020 21:13:35 -0000 1.59
+++ po/proprietary.tr.po 16 Oct 2020 11:32:30 -0000 1.60
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-10-07 23:09+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.1\n"
@@ -306,6 +307,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -356,19 +373,6 @@
"href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-"
"watching-Instagram-users-mobile-cameras.html\">gizlice gözetliyor</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Oculus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
-"Facebook'a Oculus kullanıcılarını yaygın bir Åekilde gizlice
gözetlemesi "
-"için tam yetki veriyor."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -450,6 +454,18 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Oculus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
+#~ "Facebook'a Oculus kullanıcılarını yaygın bir Åekilde gizlice
gözetlemesi "
+#~ "için tam yetki veriyor."
+
+#~ msgid ""
#~ "Apple is <a href=\"https://www.theguardian.com/technology/2020/aug/30/"
#~ "this-isnt-the-1990s-apple-under-pressure-from-app-developers\"> putting "
#~ "the squeeze on all business</a> conducted through apps for iMonsters."
Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/proprietary.zh-cn.po 10 Oct 2020 05:28:46 -0000 1.65
+++ po/proprietary.zh-cn.po 16 Oct 2020 11:32:30 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-10-10 13:07+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-10-16 11:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -288,6 +289,26 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr "<small>注ï¼è¿ç¯æç« ä¸âfreeâçæææ¯âå
è´¹çâã</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -334,18 +355,6 @@
"article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"
"\">å
æ¢ Instagram</a> çç¨æ·ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Occulus 头æ´è®¾å¤ <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october\">è¦"
-"æ±ç¨æ·å¨ Facebook ä¸è®¤è¯</a>ãè¿ä¼ç» Facebook å
¨é¢å
æ¢ Occulus
ç¨æ·çå
è´¹æ"
-"æã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -430,6 +439,17 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#~ "\">require users to identify themselves to Facebook</a>. This will give "
+#~ "Facebook free rein to pervasively snoop on Oculus users."
+#~ msgstr ""
+#~ "Occulus 头æ´è®¾å¤ <a
href=\"https://www.theverge.com/2020/8/18/21372435/"
+#~ "oculus-facebook-login-change-separate-account-support-end-quest-october\">"
+#~ "è¦æ±ç¨æ·å¨ Facebook ä¸è®¤è¯</a>ãè¿ä¼ç» Facebook å
¨é¢å
æ¢
Occulus ç¨æ·çå
"
+#~ "è´¹ææã"
+
+#~ msgid ""
#~ "Apple is <a href=\"https://www.theguardian.com/technology/2020/aug/30/"
#~ "this-isnt-the-1990s-apple-under-pressure-from-app-developers\"> putting "
#~ "the squeeze on all business</a> conducted through apps for iMonsters."
@@ -816,11 +836,6 @@
#~ "ç±ç¨åºé½å¯ä»¥è¿æ
·åï¼è¿æ¯æ¹ç¨èªç±è½¯ä»¶çä¸ä¸ªå¾å¥½ççç±ã"
#~ msgid ""
-#~ "<small>Note: this article uses the word “free” in the sense "
-#~ "of “gratis.”</small>"
-#~ msgstr "<small>注ï¼è¿ç¯æç« ä¸âfreeâçæææ¯âå
è´¹çâã</small>"
-
-#~ msgid ""
#~ "Some Avast and AVG extensions for Firefox and Chrome were found to <a "
#~ "href=\"https://www.itpro.co.uk/security/internet-security/354417/avast-"
#~ "and-avg-extensions-pulled-from-chrome\"> snoop on users' detailed "
Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- po/proprietary.zh-tw-diff.html 7 Oct 2020 17:02:21 -0000 1.172
+++ po/proprietary.zh-tw-diff.html 16 Oct 2020 11:32:30 -0000 1.173
@@ -58,8 +58,9 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -125,20 +125,20 @@
</tr>
<tr>
<td>
- <ul class="columns">
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <ul class="columns"></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -155,16 +155,16 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -212,6 +212,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202009100">
+ <p>Internet-enabled watches with proprietary software
+ are malware, violating people (specially children's)
+ privacy. In addition, they have a lot of security flaws. <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">They
+ permit access by security breakers</a> and unauthorized people,
+ and can send messages from unauthorized devices.</p>
+
+ <p><small>(Note that this article misuses the word “<a
+ href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
+ to mean “crackers.”)</small></p>
+ </li>
+
<li id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into <a
@@ -243,13 +256,6 @@
on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
-
- <li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -312,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/07 17:02:21 $
+$Date: 2020/10/16 11:32:30 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- po/proprietary.zh-tw.po 7 Oct 2020 17:02:21 -0000 1.182
+++ po/proprietary.zh-tw.po 16 Oct 2020 11:32:30 -0000 1.183
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-10-07 16:56+0000\n"
+"POT-Creation-Date: 2020-10-16 11:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Roblox (among many other games) created anti-features which sucker children "
"into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-kids-"
"spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-party "
@@ -465,14 +481,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- po/pt-br.po 7 Oct 2020 17:02:21 -0000 1.280
+++ po/pt-br.po 16 Oct 2020 11:32:30 -0000 1.281
@@ -8741,6 +8741,28 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
+"sentido de âgrátisâ.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -8756,14 +8778,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -8821,6 +8835,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.478
retrieving revision 1.479
diff -u -b -r1.478 -r1.479
--- po/ru.po 8 Oct 2020 10:29:34 -0000 1.478
+++ po/ru.po 16 Oct 2020 11:32:30 -0000 1.479
@@ -10633,6 +10633,33 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+# | [-<small>Note:-]{+<small>(Note that+} this article [-uses-] {+misuses+}
+# | the word [-“free” in the sense of
+# | “gratis.”</small>-] {+“<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
+# | “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе Ñлово
“ÑвободнÑй” "
+"иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле
“беÑплаÑнÑй”.</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -10657,18 +10684,6 @@
"accused-watching-Instagram-users-mobile-cameras.html\">подглÑдÑваеÑ
за "
"полÑзоваÑелÑми Instagram</a>, ÑкÑÑÑно вклÑÑаÑ
камеÑÑ ÑÑÑÑойÑÑва."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"ÐаÑниÑÑÑÑ Occulus <a
href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
иденÑиÑиÑиÑовалиÑÑ Ð½Ð° Facebook</a>. ÐÑо "
-"Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ Facebook наблÑдаÑÑ Ð·Ð°
полÑзоваÑелÑми Occulus, ÑколÑко дÑÑе Ñгодно."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -10724,6 +10739,18 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"ÐаÑниÑÑÑÑ Occulus <a
href=\"https://www.theverge.com/2020/8/18/21372435/"
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
иденÑиÑиÑиÑовалиÑÑ Ð½Ð° Facebook</a>. ÐÑо "
+"Ð¿Ð¾Ð·Ð²Ð¾Ð»Ð¸Ñ Facebook наблÑдаÑÑ Ð·Ð°
полÑзоваÑелÑми Occulus, ÑколÑко дÑÑе Ñгодно."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/tr.po 7 Oct 2020 21:28:56 -0000 1.58
+++ po/tr.po 16 Oct 2020 11:32:31 -0000 1.59
@@ -7756,6 +7756,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7780,25 +7796,6 @@
"href=\"https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-"
"watching-Instagram-users-mobile-cameras.html\">gizlice gözetliyor</a>."
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
-#| "\">require users to identify themselves to Facebook</a>. This will give "
-#| "Facebook free rein to pervasively snoop on Occulus users."
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Occulus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october"
-"\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
-"Facebook'a Occulus kullanıcılarını yaygın bir Åekilde gizlice
gözetlemesi "
-"için tam yetki veriyor."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -7854,6 +7851,25 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#| "\">require users to identify themselves to Facebook</a>. This will give "
+#| "Facebook free rein to pervasively snoop on Occulus users."
+msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Occulus kulaklıklar <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+"oculus-facebook-login-change-separate-account-support-end-quest-october"
+"\">kullanıcıları kendilerini Facebook'a tanıtmaya zorluyor</a>. Bu "
+"Facebook'a Occulus kullanıcılarını yaygın bir Åekilde gizlice
gözetlemesi "
+"için tam yetki veriyor."
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/zh-cn.po 10 Oct 2020 05:28:46 -0000 1.55
+++ po/zh-cn.po 16 Oct 2020 11:32:31 -0000 1.56
@@ -7529,6 +7529,26 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr "<small>注ï¼è¿ç¯æç« ä¸âfreeâçæææ¯âå
è´¹çâã</small>"
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7551,24 +7571,6 @@
"article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"
"\">å
æ¢ Instagram</a> çç¨æ·ã"
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
-#| "\">require users to identify themselves to Facebook</a>. This will give "
-#| "Facebook free rein to pervasively snoop on Occulus users."
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-"Occulus 头æ´è®¾å¤ <a href=\"https://www.theverge.com/2020/8/18/21372435/"
-"oculus-facebook-login-change-separate-account-support-end-quest-october\">è¦"
-"æ±ç¨æ·å¨ Facebook ä¸è®¤è¯</a>ãè¿ä¼ç» Facebook å
è´¹å
¨é¢å
æ¢
Occulus ç¨æ·çæ"
-"æã"
-
#
#
#
@@ -7621,6 +7623,24 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+#| "oculus-facebook-login-change-separate-account-support-end-quest-october"
+#| "\">require users to identify themselves to Facebook</a>. This will give "
+#| "Facebook free rein to pervasively snoop on Occulus users."
+msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+"Occulus 头æ´è®¾å¤ <a href=\"https://www.theverge.com/2020/8/18/21372435/"
+"oculus-facebook-login-change-separate-account-support-end-quest-october\">è¦"
+"æ±ç¨æ·å¨ Facebook ä¸è®¤è¯</a>ãè¿ä¼ç» Facebook å
è´¹å
¨é¢å
æ¢
Occulus ç¨æ·çæ"
+"æã"
+
+#. type: Content of: <div><div><ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- po/zh-tw.po 7 Oct 2020 17:02:21 -0000 1.216
+++ po/zh-tw.po 16 Oct 2020 11:32:31 -0000 1.217
@@ -7690,6 +7690,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\">They permit access by security breakers</a> and "
+"unauthorized people, and can send messages from unauthorized devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many employers are using nonfree software, including videoconference "
"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
@@ -7705,14 +7721,6 @@
"a> users by surreptitously turning on the device's camera."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
-"facebook-login-change-separate-account-support-end-quest-october\">require "
-"users to identify themselves to Facebook</a>. This will give Facebook free "
-"rein to pervasively snoop on Oculus users."
-msgstr ""
-
#
#
#
@@ -7774,6 +7782,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
+"facebook-login-change-separate-account-support-end-quest-october\">require "
+"users to identify themselves to Facebook</a>. This will give Facebook free "
+"rein to pervasively snoop on Oculus users."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary.pt-br.html po/de.po...,
GNUN <=