[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 2 Nov 2020 10:03:02 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/02 10:03:01
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.393&r2=1.394
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.349&r2=1.350
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.551&r2=1.552
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.361&r2=1.362
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.343&r2=1.344
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.639&r2=1.640
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.374&r2=1.375
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.215&r2=1.216
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.410&r2=1.411
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.490&r2=1.491
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.223&r2=1.224
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- de.po 2 Nov 2020 11:01:43 -0000 1.223
+++ de.po 2 Nov 2020 15:02:53 -0000 1.224
@@ -7273,6 +7273,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -12391,16 +12401,6 @@
"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -13446,6 +13446,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- es.po 2 Nov 2020 11:01:43 -0000 1.319
+++ es.po 2 Nov 2020 15:02:53 -0000 1.320
@@ -7080,6 +7080,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -12376,22 +12386,6 @@
"philosophy/free-sw.html\">software libre</a>” para referirse a "
"gratuito.)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Muchos empresarios están utilizando software privativo, incluido software de
"
-"videoconferencia, para <a href=\"https://www.theguardian.com/world/2020/"
-"sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
-"surveillance\">vigilar y monitorizar el trabajo de los empleados en casa</"
-"a>. Si el programa informa de si la persona está «activa», esa es en
efecto "
-"una caracterÃstica maliciosa de vigilancia."
-
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -13445,6 +13439,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"Muchos empresarios están utilizando software privativo, incluido software de
"
+"videoconferencia, para <a href=\"https://www.theguardian.com/world/2020/"
+"sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+"surveillance\">vigilar y monitorizar el trabajo de los empleados en casa</"
+"a>. Si el programa informa de si la persona está «activa», esa es en
efecto "
+"una caracterÃstica maliciosa de vigilancia."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.393
retrieving revision 1.394
diff -u -b -r1.393 -r1.394
--- fr.po 2 Nov 2020 11:01:43 -0000 1.393
+++ fr.po 2 Nov 2020 15:02:53 -0000 1.394
@@ -6164,6 +6164,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -10741,22 +10751,6 @@
"to-avoid.html#Hacker\">hackers</a> » pour désigner des pirates
informatiques "
"â aussi appelés crackers.)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"De nombreux employeurs utilisent du logiciel non libre, de vidéo-conférence
"
-"en particulier, pour <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\">surveiller et vérifier le télétravail de leurs collaborateurs</a>. "
-"Lorsqu'un programme rapporte si on est « actif » ou non, il contient en
fait "
-"une fonctionnalité malveillante."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11657,6 +11651,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"De nombreux employeurs utilisent du logiciel non libre, de vidéo-conférence
"
+"en particulier, pour <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\">surveiller et vérifier le télétravail de leurs collaborateurs</a>. "
+"Lorsqu'un programme rapporte si on est « actif » ou non, il contient en
fait "
+"une fonctionnalité malveillante."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- it.po 2 Nov 2020 11:01:44 -0000 1.223
+++ it.po 2 Nov 2020 15:02:55 -0000 1.224
@@ -6787,6 +6787,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -11537,16 +11547,6 @@
"”)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -12588,6 +12588,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- ja.po 2 Nov 2020 11:01:44 -0000 1.231
+++ ja.po 2 Nov 2020 15:02:55 -0000 1.232
@@ -5298,6 +5298,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -9004,16 +9014,6 @@
"”)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -9899,6 +9899,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-microsoft.de-diff.html 17 Oct 2020 08:05:07 -0000 1.54
+++ malware-microsoft.de-diff.html 2 Nov 2020 15:02:55 -0000 1.55
@@ -452,12 +452,11 @@
<p>Once</em></ins></span> Microsoft has tricked a user
into accepting installation of Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</em></ins></span>
- find that they are denied the option to cancel or even postpone the
- imposed date of <span class="removed"><del><strong>installation</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p></em></ins></span>
-
+ find that they are denied <span class="removed"><del><strong>the option to
cancel or even postpone the
+ imposed date of installation</a>.
+ </p>
<p>This demonstrates what we've said for years: using proprietary
- software means letting someone have <span
class="removed"><del><strong>power over you, and you're
+ software means letting someone have power over you, and you're
going to get screwed sooner or later.</p></li>
<li><p>Microsoft
@@ -473,27 +472,31 @@
</p>
<p>Free software developers also stop maintaining old versions of
their programs, but this is not unfair to users because the
- users of free software have control</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> over <span
class="removed"><del><strong>it. If it is important
- enough to</strong></del></span> you, <span
class="removed"><del><strong>you</strong></del></span> and <span
class="removed"><del><strong>other users can hire someone to support
+ users of free software have control over it. If it is important
+ enough to you, you and other users can hire someone to support
the old version on your future platforms.
</p></li>
<li><p>Microsoft
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
forcibly pushing Windows
- update</strong></del></span> <span class="inserted"><ins><em>you're
going</em></ins></span>
- to <span class="removed"><del><strong>its version 10</a>, ignoring
the flag on Windows 7</strong></del></span> <span class="inserted"><ins><em>get
screwed sooner</em></ins></span> or <span class="removed"><del><strong>8
- that you could set</strong></del></span> <span
class="inserted"><ins><em>later.</p>
+ update to its version 10</a>, ignoring the flag on Windows 7 or 8
+ that you could set</strong></del></span> <span
class="inserted"><ins><em>the option</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms</strong></del></span>
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
<span class="removed"><del><strong>presence</strong></del></span>
+ <span class="inserted"><ins><em>imposed date</em></ins></span> of
+ <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
+
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you,</em></ins></span> and
<span class="removed"><del><strong>8.</p></li>
+
+ <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>you're going
+ to get screwed sooner or later.</p>
</li>
<li id="M201601310">
<p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
- a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7 and 8.</p></li>
-
- <li><p>Windows</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ for its USB-to-serial chips has been designed to <a
+
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
@@ -539,44 +542,75 @@
<p>A person or company has the right to cease to work on a particular
program; the wrong here is Microsoft does this after having made the
users dependent on Microsoft, because they are not free to ask anyone
- else to work on the program <span class="removed"><del><strong>for
them.</p></li>
+ else to work on the program for <span
class="removed"><del><strong>them.</p></li>
</ul>
<h3 id="interference">Microsoft Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+for</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ </li>
+
+ <li id="M201306220">
+ <p><a
+
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
+ informs</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty and wrong. This section
describes examples of Microsoft committing
interference.</p>
<ul>
<li><p>Microsoft is planning to make Windows <a
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use of its browser, Edge, in certain
circumstances</a>.</p>
- <p>The reason Microsoft can force things on users is that Windows is
+ impose use</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> of <span
class="removed"><del><strong>its browser, Edge,</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in <span
class="removed"><del><strong>certain circumstances</a>.</p>
+ <p>The reason Microsoft can force things on users is
that</strong></del></span> Windows <span class="removed"><del><strong>is
nonfree.</p></li>
- <li><p>Windows displays
- <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ <li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>before fixing them</a>.</p>
+ </li>
+</ul>
+
+
+<h3 id="subscriptions">Subscriptions</h3>
+
+<ul class="blurbs">
+ <li id="M201507150">
+ <p>Microsoft Office forces users</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
intrusive ads for Microsoft products and its
partners' products</a>.</p>
<p>The article's author starts from the premise that Microsoft
- has a right to control what Windows does to users, as long as it
+ has a right</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe</em></ins></span> to <span class="removed"><del><strong>control
what Windows does</strong></del></span> <span class="inserted"><ins><em>Office
365</em></ins></span> to <span class="removed"><del><strong>users, as long as it
doesn't go “too far”. We disagree.</p></li>
<li><p>Microsoft inserts <a
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
- annoying advertisements inside of the File Explorer</a> to nag
- users to buy subscriptions for the OneDrive service.</p></li>
+ annoying advertisements inside of the File
Explorer</a></strong></del></span> <span class="inserted"><ins><em>be
able</em></ins></span> to <span
class="removed"><del><strong>nag</strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
+ </li>
+</ul>
+
+
+<h3 id="surveillance">Surveillance</h3>
+
+<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
+ users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
-<li>In order to increase Windows 10's install base, Microsoft
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft
<a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.
-</li>
+blatantly disregards user choice</strong></del></span>
+ and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>use the Windows operating system, which is malware.
The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
-<li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
-users obnoxiously and repeatedly to install Windows
10</a>.</p></li>
+ <span class="inserted"><ins><em><li id="M201908210">
+ <p>Microsoft recorded</em></ins></span> users <span
class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>of Xboxes</em></ins></span> and <span
class="removed"><del><strong>repeatedly to install Windows
10</a>.</p></li>
<li><p>Microsoft
<a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
@@ -585,49 +619,27 @@
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing Windows 7 with Windows 10</a>.</p></li>
- <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span> <span class="inserted"><ins><em>for them.</p>
- </li>
+ <li><p>Microsoft has made companies' Windows machines managed by
the
+company's
+sysadmins</strong></del></span> <span
class="inserted"><ins><em>had</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users to complain</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen</em></ins></span> to the <span
class="removed"><del><strong>sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
- <li id="M201306220">
- <p><a
-
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
- informs</em></ins></span> the
-<span class="removed"><del><strong>company's
-sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue</strong></del></span>
<span class="inserted"><ins><em>NSA of bugs in Windows before fixing
them</a>.</p>
+ <p>Morally, we see no difference between having human workers listen
and
+ having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
-</ul>
-
-<h3 id="subscriptions">Subscriptions</h3>
-
-<ul class="blurbs">
- <li id="M201507150">
- <p>Microsoft Office forces</em></ins></span> users <span
class="inserted"><ins><em><a
-
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>the sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
-10</a>.</p></li></strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
- </li></em></ins></span>
+ <li id="M201908151">
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Windows
+10</a>.</p></li>
</ul>
-
-<h3 <span class="removed"><del><strong>id="surveillance">Microsoft
Surveillance</h3>
+<h3 id="surveillance">Microsoft Surveillance</h3>
<ul>
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
-
-<ul class="blurbs">
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
-
- <p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
- </li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>say whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
@@ -991,7 +1003,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/02 15:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- malware-microsoft.de.po 17 Oct 2020 08:05:07 -0000 1.150
+++ malware-microsoft.de.po 2 Nov 2020 15:02:55 -0000 1.151
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -972,6 +972,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- malware-microsoft.es.po 17 Oct 2020 12:00:47 -0000 1.176
+++ malware-microsoft.es.po 2 Nov 2020 15:02:55 -0000 1.177
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -773,6 +774,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- malware-microsoft.fr.po 17 Oct 2020 08:29:20 -0000 1.192
+++ malware-microsoft.fr.po 2 Nov 2020 15:02:55 -0000 1.193
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -771,6 +772,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-microsoft.it-diff.html 17 Oct 2020 08:05:07 -0000 1.53
+++ malware-microsoft.it-diff.html 2 Nov 2020 15:02:55 -0000 1.54
@@ -396,8 +396,7 @@
<li><p>Microsoft
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- forcibly pushing Windows
- update to its version 10</a>, ignoring</strong></del></span> <span
class="inserted"><ins><em>platforms.</p>
+ forcibly pushing</strong></del></span> <span
class="inserted"><ins><em>platforms.</p>
</li>
</ul>
@@ -405,7 +404,7 @@
<h3 id="sabotage">Sabotage</h3>
<p>The wrongs in this section are not precisely malware, since they do
-not involve making</em></ins></span> the <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>program that runs in a way that hurts the user.
+not involve making the program that runs in a way that hurts the user.
But they are a lot like malware, since they are technical Microsoft
actions that harm the users of specific Microsoft software.</p>
@@ -414,23 +413,22 @@
<p>Microsoft has been <a
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
force-installing a “remediation”
- program</a></em></ins></span> on <span
class="inserted"><ins><em>computers running certain
- versions of</em></ins></span> Windows <span class="removed"><del><strong>7
or 8
- that you could set</strong></del></span> <span
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means <a
+ program</a> on computers running certain
+ versions of</em></ins></span> Windows
+ <span class="removed"><del><strong>update</strong></del></span> <span
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up">
- tampering with users' settings and files</a>,
notably</em></ins></span> to <span class="removed"><del><strong>not upgrade.
This reaffirms</strong></del></span>
- <span class="inserted"><ins><em>“repair” any components
of</em></ins></span> the <span
class="removed"><del><strong>presence</strong></del></span> <span
class="inserted"><ins><em>updating system that users
+ tampering with users' settings and files</a>,
notably</em></ins></span> to <span class="removed"><del><strong>its version
10</a>, ignoring</strong></del></span>
+ <span class="inserted"><ins><em>“repair” any components
of</em></ins></span> the <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
- users' machines, causing numerous problems, some</em></ins></span> of
<span class="inserted"><ins><em>which <a
+ users' machines, causing numerous problems, some of which <a
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
critical</a>.</p>
<p>This exemplifies the arrogant and manipulative attitude
that proprietary software developers have learned to adopt
- toward the people they are supposedly serving. Migrate
to</em></ins></span> a <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a></strong></del></span>
- <span class="inserted"><ins><em>href="/distros/free-distros.html">free
operating system</a> if you
+ toward the people they are supposedly serving. Migrate to a <a
+ href="/distros/free-distros.html">free operating system</a> if you
can!</p>
<p>If your employer makes you run Windows, tell the financial
@@ -439,69 +437,53 @@
</li>
<li id="M201704194">
- <p>Microsoft has made Windows</em></ins></span> 7
- and <span class="removed"><del><strong>8.</p></li>
-
- <li><p>Windows 10 “upgrades” <a
-
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
- delete applications</a> without asking
permission.</p></li>
-
- <li><p>
- Microsoft is</strong></del></span> <span class="inserted"><ins><em>8 cease
to function on certain new computers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- repeatedly nagging many users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
- forcing their owners to switch</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> Windows <span
class="removed"><del><strong>10</a>.
- </p></li>
-
-<li><p></strong></del></span> <span
class="inserted"><ins><em>10</a>.</p>
+ <p>Microsoft has made Windows 7
+ and 8 cease to function</em></ins></span> on <span
class="inserted"><ins><em>certain new computers, <a
+
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
+ forcing their owners to switch to Windows 10</a>.</p>
</li>
<li id="M201704134">
<p>Microsoft <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for Windows 7 and 8 on recent processors</a>
+ has dropped support for</em></ins></span> Windows 7 <span
class="removed"><del><strong>or</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> 8 <span
class="inserted"><ins><em>on recent processors</a>
in a big hurry.</p>
- <p>It makes no difference what legitimate reasons</em></ins></span>
Microsoft <span class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>might
- have</em></ins></span> for <span class="removed"><del><strong>months <a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
-tricking</strong></del></span> <span class="inserted"><ins><em>not doing work
to support them. If it doesn't want to do
- this work, it should let</em></ins></span> users <span
class="removed"><del><strong>into “upgrading”</strong></del></span>
<span class="inserted"><ins><em>do the work.</p>
+ <p>It makes no difference what legitimate reasons Microsoft might
+ have for not doing work to support them. If it doesn't want to do
+ this work, it should let users do the work.</p>
</li>
<li id="M201606270">
- <p id="windows10-forcing">In its efforts</em></ins></span> to <span
class="inserted"><ins><em>trick users of</em></ins></span> Windows <span
class="removed"><del><strong>10</a>, if they
-failed to notice</strong></del></span>
- <span class="inserted"><ins><em>7</em></ins></span> and <span
class="removed"><del><strong>say no.
-</p></li>
-
- <li><p><a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"></strong></del></span>
<span class="inserted"><ins><em>8 into installing all-spying Windows 10
against their
- will,</em></ins></span> Microsoft <span
class="removed"><del><strong>informs</strong></del></span> <span
class="inserted"><ins><em>forced their computers to <a
+ <p id="windows10-forcing">In its efforts to trick users of Windows
+ 7 and 8 into installing all-spying Windows 10 against their
+ will, Microsoft forced their computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- silently download…</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>whole</em></ins></span> of <span
class="removed"><del><strong>bugs</strong></del></span> <span
class="inserted"><ins><em>Windows 10</a>! Apparently,
+ silently download… the whole of Windows 10</a>! Apparently,
this was done through a <a
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
- jeopardize important operations</em></ins></span> in <span
class="inserted"><ins><em>regions of the world with poor
+ jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
- found out that this “upgrade” was in fact a <a
+ found out</em></ins></span> that <span class="removed"><del><strong>you
could set</strong></del></span> <span class="inserted"><ins><em>this
“upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
<li id="M201606010">
<p>Once Microsoft has tricked a user
- into accepting installation of</em></ins></span> Windows <span
class="removed"><del><strong>before fixing them.</a></p></li>
-
- <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"></strong></del></span>
<span class="inserted"><ins><em>10, <a
+ into accepting installation of Windows 10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied the option to cancel or even postpone the
- imposed date of installation</a>.</p>
+ find that they are denied the option</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms</strong></del></span>
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
<span class="removed"><del><strong>presence</strong></del></span>
+ <span class="inserted"><ins><em>imposed date</em></ins></span> of
+ <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
<p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you, and you're going
+ software means letting someone have power over you,</em></ins></span> and
<span class="removed"><del><strong>8.</p></li>
+
+ <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>you're going
to get screwed sooner or later.</p>
</li>
@@ -510,15 +492,34 @@
for its USB-to-serial chips has been designed to <a
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
- so that they no longer work.</em></ins></span> Microsoft <span
class="inserted"><ins><em>is <a
+ so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
<li id="M201511240">
- <p>Windows 10 “upgrades” <a
+ <p>Windows</em></ins></span> 10 “upgrades” <a
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
- delete applications</a> without asking permission.</p>
+ delete applications</a> without asking <span
class="removed"><del><strong>permission.</p></li>
+
+ <li><p>
+ Microsoft is <a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+ repeatedly nagging many users to install Windows 10</a>.
+ </p></li>
+
+<li><p>
+Microsoft was for months <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+tricking users into “upgrading” to Windows 10</a>, if they
+failed to notice and say no.
+</p></li>
+
+ <li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ Microsoft informs the NSA of bugs in Windows before fixing
them.</a></p></li>
+
+ <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
+ Microsoft</strong></del></span> <span
class="inserted"><ins><em>permission.</p>
</li>
<li id="M201503260">
@@ -541,7 +542,13 @@
<h3 id="interference">Microsoft Interference</h3>
<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+for</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ </li>
+
+ <li id="M201306220">
+ <p><a
+
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
+ informs</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty and wrong. This section
describes examples</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> of <span
class="removed"><del><strong>Microsoft committing
interference.</p>
<ul>
@@ -549,73 +556,80 @@
<a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
intrusive ads for Microsoft products and its
partners' products</a>.</p>
- <p>The article's author starts from</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ <p>The article's author starts from the premise that Microsoft
+ has a right to control what</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span
class="removed"><del><strong>does to users, as long as it
+ doesn't go “too far”. We disagree.</p></li>
+
+ <li><p>Microsoft inserts</strong></del></span> <span
class="inserted"><ins><em>before fixing them</a>.</p>
</li>
+</ul>
- <li id="M201306220">
- <p><a
-
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
- informs</em></ins></span> the <span class="removed"><del><strong>premise
that Microsoft
- has a right to control what Windows does to users, as long as it
- doesn't go “too far”. We disagree.</p></li>
- <li><p>Microsoft inserts <a
-href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
- annoying advertisements inside</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> of <span
class="removed"><del><strong>the File Explorer</a> to nag
- users to buy subscriptions for the OneDrive service.</p></li>
+<h3 id="subscriptions">Subscriptions</h3>
+
+<ul class="blurbs">
+ <li id="M201507150">
+ <p>Microsoft Office forces users</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside of the File
Explorer</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe</em></ins></span> to <span class="removed"><del><strong>nag
+ users</strong></del></span> <span class="inserted"><ins><em>Office
365</em></ins></span> to <span class="removed"><del><strong>buy subscriptions
for the OneDrive service.</p></li>
-<li>In order to increase</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span
class="removed"><del><strong>10's install base, Microsoft
+<li>In order</strong></del></span> <span class="inserted"><ins><em>be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's install base, Microsoft
<a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.</strong></del></span>
<span class="inserted"><ins><em>before fixing
them</a>.</p></em></ins></span>
+blatantly disregards user choice and privacy</a>.</strong></del></span>
<span class="inserted"><ins><em>create/edit
documents</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+started</strong></del></span>
<span class="inserted"><ins><em></ul>
-<h3 id="subscriptions">Subscriptions</h3>
+<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
- <li id="M201507150">
- <p>Microsoft Office forces</em></ins></span> users <span
class="removed"><del><strong>obnoxiously and repeatedly to install Windows
10</a>.</p></li>
+ <li id="M201912160">
+ <p>Microsoft is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
+ users <span class="removed"><del><strong>obnoxiously and
repeatedly</strong></del></span> <span class="inserted"><ins><em>to create an
account on their network</a> to be able</em></ins></span> to install
<span class="removed"><del><strong>Windows 10</a>.</p></li>
- <li><p>Microsoft</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ <li><p>Microsoft
+ <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking
users</a> <a
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing Windows 7 with Windows 10</a>.</p></li>
- <li><p>Microsoft has made companies' Windows machines managed by
the
-company's
+ <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span>
+ <span class="inserted"><ins><em>and use</em></ins></span> the
+<span class="removed"><del><strong>company's
sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
-users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>the sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
-10</a>.</p></li></strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
- </li></em></ins></span>
-</ul>
-
-
-<h3 <span class="removed"><del><strong>id="surveillance">Microsoft
Surveillance</h3>
-
-<ul>
-
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+users</strong></del></span> <span class="inserted"><ins><em>Windows operating
system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>a subscription product.</p>
+ </li>
-<ul class="blurbs">
<li id="M201908210">
<p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ human workers listen</em></ins></span> to the <span
class="removed"><del><strong>sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
<li id="M201908151">
- <p>Skype refuses to say whether it can <a
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Windows
+10</a>.</p></li>
+</ul>
+
+<h3 id="surveillance">Microsoft Surveillance</h3>
+
+<ul>
+
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>say whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
@@ -973,7 +987,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/02 15:02:55 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- malware-microsoft.it.po 17 Oct 2020 08:05:07 -0000 1.155
+++ malware-microsoft.it.po 2 Nov 2020 15:02:59 -0000 1.156
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -925,6 +925,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-microsoft.ja-diff.html 17 Oct 2020 08:05:07 -0000 1.68
+++ malware-microsoft.ja-diff.html 2 Nov 2020 15:02:59 -0000 1.69
@@ -293,23 +293,29 @@
<p>The wrongs in this</strong></del></span> <span
class="inserted"><ins><em>id="interference">Interference</h3>
-<p>This</em></ins></span> section <span class="removed"><del><strong>are
not precisely malware, since they do</strong></del></span> <span
class="inserted"><ins><em>gives examples of Microsoft software harassing or
annoying
-the user, or causing trouble for the user. These actions are like
-sabotage but the word “sabotage” is too strong for them.</p>
+<p>This</em></ins></span> section <span class="removed"><del><strong>are
not precisely malware, since they do
+not involve making</strong></del></span> <span class="inserted"><ins><em>gives
examples of Microsoft software harassing or annoying</em></ins></span>
+the <span class="removed"><del><strong>program that runs in a way that
hurts</strong></del></span> <span class="inserted"><ins><em>user, or causing
trouble for</em></ins></span> the user.
+<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions</em></ins></span> are <span
class="removed"><del><strong>a lot</strong></del></span> like <span
class="removed"><del><strong>malware, since they are technical Microsoft
+actions that harm to</strong></del></span>
+<span class="inserted"><ins><em>sabotage but</em></ins></span> the <span
class="inserted"><ins><em>word “sabotage” is too strong for
them.</p>
<ul class="blurbs">
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
- harangues users if they try to install Firefox (or
Chrome)</a>.</p>
+ harangues</em></ins></span> users <span class="inserted"><ins><em>if they
try to install Firefox (or Chrome)</a>.</p>
</li>
<li id="M201803190">
<p>Microsoft is planning to make Windows <a
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use of its browser, Edge, in certain
circumstances</a>.</p>
+ impose use</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>its browser, Edge, in certain
circumstances</a>.</p>
- <p>The reason Microsoft can force things on users is that Windows
+ <p>The reason</em></ins></span> Microsoft <span
class="removed"><del><strong>software.</p>
+
+<ul>
+ <li><p>Once</strong></del></span> <span
class="inserted"><ins><em>can force things on users is that Windows
is nonfree.</p>
</li>
@@ -319,8 +325,8 @@
intrusive ads for Microsoft products and its partners'
products</a>.</p>
- <p>The article's author starts from the premise that Microsoft has
- a right to control what Windows does to users, as long as it doesn't
+ <p>The article's author starts from the premise
that</em></ins></span> Microsoft has <span
class="removed"><del><strong>tricked</strong></del></span>
+ a <span class="removed"><del><strong>user into accepting
installation</strong></del></span> <span class="inserted"><ins><em>right to
control what Windows does to users, as long as it doesn't
go “too far”. We disagree.</p>
</li>
@@ -332,19 +338,26 @@
</li>
<li id="M201608170">
- <p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
- on computers that were running Windows 7 and 8, Microsoft <a
-
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- repeatedly switched on a flag that urged users to
- “upgrade” to Windows 10</a> when they had turned
- it off, in the hope that some day they would fail to say no.
+ <p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download</em></ins></span> of Windows
+ <span class="removed"><del><strong>10,</strong></del></span> <span
class="inserted"><ins><em>10</a>
+ on computers that were running Windows 7 and 8,
Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ repeatedly switched on a flag</em></ins></span> that <span
class="inserted"><ins><em>urged users to
+ “upgrade” to Windows 10</a> when</em></ins></span> they
<span class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>had turned
+ it off, in</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail</em></ins></span>
to <span class="removed"><del><strong>cancel or even postpone the
+ imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
<p>A detailed <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- analysis of Microsoft's scheme</a> is available on the Electronic
+ analysis</em></ins></span> of <span
class="removed"><del><strong>installation</a>.
+ </p>
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you, and you're
+ going</strong></del></span> <span class="inserted"><ins><em>Microsoft's
scheme</a> is available on the Electronic
Frontier Foundation's website.</p>
</li>
@@ -352,24 +365,29 @@
<p>Microsoft has made companies'
Windows machines managed by the company's sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
- users to complain to the sysadmins about not “upgrading”
+ users</em></ins></span> to <span class="removed"><del><strong>get screwed
sooner or later.</p></li>
+
+ <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>complain to the sysadmins about not
“upgrading”
to Windows 10</a>.</p>
</li>
<li id="M201601160">
- <p>Microsoft has <a
+ <p>Microsoft</em></ins></span> has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
all future Intel CPUs for Windows 7 and 8</a>. Those
machines will be stuck with the nastier Windows 10. <a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
- AMD and Qualcomm CPUs, too</a>.</p>
+ AMD and Qualcomm CPUs, <span class="removed"><del><strong>too</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
<p>Of course, Windows 7 and 8 are unethical too, because they are
proprietary software. But this example of Microsoft's wielding its
- power demonstrates the power it holds.</p>
+ power demonstrates the power it <span class="removed"><del><strong>holds.
+ </p></strong></del></span> <span
class="inserted"><ins><em>holds.</p></em></ins></span>
<p>Free software developers also stop maintaining old versions of
- their programs, but this is not unfair to users because the users of
+ their programs, but this is not unfair to users because the
+ <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>users of
free software have control over it. If it is important enough to you,
you and other users can hire someone to support the old version on
your future platforms.</p>
@@ -379,43 +397,31 @@
<h3 id="sabotage">Sabotage</h3>
-<p>The wrongs in this section are not precisely malware, since they
do</em></ins></span>
+<p>The wrongs in this section are not precisely malware, since they do
not involve making the program that runs in a way that hurts the user.
But they are a lot like malware, since they are technical Microsoft
-actions that harm <span class="removed"><del><strong>to</strong></del></span>
the users of specific Microsoft software.</p>
+actions that harm the users of specific Microsoft software.</p>
-<span class="removed"><del><strong><ul>
- <li><p>Once Microsoft</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201904041">
- <p>Microsoft</em></ins></span> has <span
class="removed"><del><strong>tricked</strong></del></span> <span
class="inserted"><ins><em>been <a
+ <p>Microsoft has been <a
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
- force-installing</em></ins></span> a <span
class="removed"><del><strong>user into accepting
installation</strong></del></span> <span
class="inserted"><ins><em>“remediation”
+ force-installing a “remediation”
program</a> on computers running certain
- versions</em></ins></span> of Windows
- <span class="removed"><del><strong>10,</strong></del></span> <span
class="inserted"><ins><em>10. Remediation, in Microsoft's view,
means</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied the option</strong></del></span>
- <span
class="inserted"><ins><em>href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up">
- tampering with users' settings and files</a>,
notably</em></ins></span> to <span class="removed"><del><strong>cancel or even
postpone</strong></del></span>
- <span class="inserted"><ins><em>“repair” any components
of</em></ins></span> the
- <span class="removed"><del><strong>imposed date</strong></del></span> <span
class="inserted"><ins><em>updating system that users
+ versions of Windows 10. Remediation, in Microsoft's view, means <a
+
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up">
+ tampering with users' settings and files</a>, notably to
+ “repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
- them. Microsoft repeatedly pushed faulty versions</em></ins></span> of
<span class="removed"><del><strong>installation</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>this
program to
+ them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
- critical</a>.</p></em></ins></span>
-
- <p>This <span class="removed"><del><strong>demonstrates what we've
said for years: using</strong></del></span> <span
class="inserted"><ins><em>exemplifies the arrogant and manipulative attitude
- that</em></ins></span> proprietary software <span
class="removed"><del><strong>means letting someone</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> have <span
class="removed"><del><strong>power over you, and you're
- going</strong></del></span> <span
class="inserted"><ins><em>learned</em></ins></span> to <span
class="removed"><del><strong>get screwed sooner or later.</p></li>
+ critical</a>.</p>
- <li><p>Microsoft
- has</strong></del></span> <span class="inserted"><ins><em>adopt
- toward the people they are supposedly serving. Migrate to
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
- all future Intel CPUs for</strong></del></span>
- <span class="inserted"><ins><em>href="/distros/free-distros.html">free
operating system</a> if you
+ <p>This exemplifies the arrogant and manipulative attitude
+ that proprietary software developers have learned to adopt
+ toward the people they are supposedly serving. Migrate to a <a
+ href="/distros/free-distros.html">free operating system</a> if you
can!</p>
<p>If your employer makes you run Windows, tell the financial
@@ -424,20 +430,16 @@
</li>
<li id="M201704194">
- <p>Microsoft has made</em></ins></span> Windows 7
- and <span class="removed"><del><strong>8</a>. Those machines will
- be stuck with the nastier</strong></del></span> <span
class="inserted"><ins><em>8 cease to function on certain new computers, <a
+ <p>Microsoft has made Windows 7
+ and 8 cease to function on certain new computers, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
- forcing their owners to switch to</em></ins></span> Windows <span
class="removed"><del><strong>10.</strong></del></span> <span
class="inserted"><ins><em>10</a>.</p>
+ forcing their owners to switch to Windows 10</a>.</p>
</li>
<li id="M201704134">
- <p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
- AMD</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for Windows 7</em></ins></span> and <span
class="removed"><del><strong>Qualcomm CPUs, too</a>.
- </p>
- <p>Of course,</strong></del></span> <span class="inserted"><ins><em>8
on recent processors</a>
+ <p>Microsoft <a
+
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
+ has dropped support for Windows 7 and 8 on recent processors</a>
in a big hurry.</p>
<p>It makes no difference what legitimate reasons Microsoft might
@@ -446,8 +448,8 @@
</li>
<li id="M201606270">
- <p id="windows10-forcing">In its efforts to trick users
of</em></ins></span> Windows
- 7 and 8 <span class="removed"><del><strong>are unethical too,
because</strong></del></span> <span class="inserted"><ins><em>into installing
all-spying Windows 10 against their
+ <p id="windows10-forcing">In its efforts to trick users of Windows
+ 7 and 8 into installing all-spying Windows 10 against their
will, Microsoft forced their computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
silently download… the whole of Windows 10</a>! Apparently,
@@ -466,14 +468,8 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that</em></ins></span> they are
- <span class="removed"><del><strong>proprietary software. But this example
of Microsoft's wielding its
- power demonstrates</strong></del></span> <span
class="inserted"><ins><em>denied</em></ins></span> the <span
class="removed"><del><strong>power it holds.
- </p>
- <p>Free software developers also stop maintaining old versions of
- their programs, but this is not unfair</strong></del></span> <span
class="inserted"><ins><em>option</em></ins></span> to <span
class="removed"><del><strong>users because</strong></del></span> <span
class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
- <span class="removed"><del><strong>users</strong></del></span>
- <span class="inserted"><ins><em>imposed date</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
+ find that they are denied the option to cancel or even postpone the
+ imposed date</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
<p>This demonstrates what we've said for years: using
proprietary</em></ins></span>
software <span class="inserted"><ins><em>means letting
someone</em></ins></span> have <span
class="removed"><del><strong>control</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> over <span
class="removed"><del><strong>it. If it is important
@@ -567,7 +563,7 @@
<ul>
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>increase Windows 10's install base,
Microsoft</strong></del></span> <span class="inserted"><ins><em>be able to
create/edit documents</a>.</p>
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>Office 365 to be able to create/edit
documents</a>.</p>
</li>
</ul>
@@ -575,6 +571,15 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft</strong></del></span>
+ <span class="inserted"><ins><em>and use the Windows operating system,
which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M201908210">
<p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
@@ -958,7 +963,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:07 $
+$Date: 2020/11/02 15:02:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- malware-microsoft.ja.po 17 Oct 2020 08:05:07 -0000 1.135
+++ malware-microsoft.ja.po 2 Nov 2020 15:02:59 -0000 1.136
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -750,6 +750,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-microsoft.pot 17 Oct 2020 08:05:07 -0000 1.93
+++ malware-microsoft.pot 2 Nov 2020 15:02:59 -0000 1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -535,6 +535,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a "
+"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\">tricking
"
+"users to create an account on their network</a> to be able to install and "
+"use the Windows operating system, which is malware. The account can be used "
+"for surveillance and/or violating people's rights in many ways, such as "
+"turning their purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a "
"href=\"https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana\">
"
"human workers listen to the recordings</a>."
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- malware-microsoft.ru.po 19 Oct 2020 10:00:05 -0000 1.233
+++ malware-microsoft.ru.po 2 Nov 2020 15:02:59 -0000 1.234
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -768,6 +769,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft recorded users of Xboxes and had <a href=\"https://www.vice.com/en/"
"article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-"
"kinect-cortana\"> human workers listen to the recordings</a>."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- nl.po 2 Nov 2020 11:01:44 -0000 1.224
+++ nl.po 2 Nov 2020 15:02:59 -0000 1.225
@@ -4858,6 +4858,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -8340,16 +8350,6 @@
"”)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -9145,6 +9145,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- pl.po 2 Nov 2020 11:01:44 -0000 1.223
+++ pl.po 2 Nov 2020 15:02:59 -0000 1.224
@@ -4336,6 +4336,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7841,16 +7851,6 @@
"”)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8629,6 +8629,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- pot 2 Nov 2020 11:01:44 -0000 1.222
+++ pot 2 Nov 2020 15:02:59 -0000 1.223
@@ -4077,6 +4077,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7160,16 +7170,6 @@
"”)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#
#
#
@@ -7861,6 +7861,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-surveillance.de-diff.html 17 Oct 2020 08:05:09 -0000
1.135
+++ proprietary-surveillance.de-diff.html 2 Nov 2020 15:02:59 -0000
1.136
@@ -278,6 +278,15 @@
<li><p>Windows</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -556,19 +565,28 @@
<div class="big-subsection">
<span class="inserted"><ins><em><span
id="SpywareAtLowLevel"></span></em></ins></span>
- <h4 <span
class="removed"><del><strong>id="SpywareInAndroid">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInBIOS">BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInAndroid">Spyware
in Android</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInBIOS">BIOS</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li>
+ <p>20 dishonest Android apps
+ recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201509220">
<p><a
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
- Lenovo stealthily installed crapware and spyware via
+ Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
+ snoopers</a>.</p>
+
+ <p>Google</strong></del></span> <span
class="inserted"><ins><em>spyware via
BIOS</a> on Windows installs. Note that the specific
- sabotage method Lenovo used did not affect GNU/Linux; also, a
+ sabotage method Lenovo used</em></ins></span> did not <span
class="removed"><del><strong>intend to make these</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span
class="removed"><del><strong>Android</h4></strong></del></span> <span
class="inserted"><ins><em>its
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
own malware</a>.</p>
</li>
</ul>
@@ -576,14 +594,10 @@
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></em></ins></span>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
-
-<span class="removed"><del><strong><ul>
-<li>
- <p>20 dishonest Android</strong></del></span>
-<span class="inserted"><ins><em><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<div class="big-subsection">
<h4 id="SpywareInTelephones">All “Smart” Phones</h4>
@@ -592,45 +606,67 @@
<ul class="blurbs">
<li id="M202006260">
- <p>Most</em></ins></span> apps
- <span class="removed"><del><strong>recorded</strong></del></span> <span
class="inserted"><ins><em>are malware, but
- Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on users as well
- as snooping on</em></ins></span> them <span
class="removed"><del><strong>and text messages and emails to
- snoopers</a>.</p>
-
- <p>Google did</strong></del></span> <span
class="inserted"><ins><em>itself</a>.</p>
+ <p>Most</em></ins></span> apps <span
class="removed"><del><strong>spy;</strong></del></span> <span
class="inserted"><ins><em>are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop</em></ins></span> on
<span class="removed"><del><strong>the contrary,</strong></del></span> <span
class="inserted"><ins><em>users as well
+ as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
- approach, but that does</em></ins></span> not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>tell us whether it has functionalities we
- consider malicious, such as sending data the user has not explicitly
+ approach, but that does not tell us whether</em></ins></span> it
+ <span class="removed"><del><strong>worked in various ways to prevent that,
and deleted these apps
+ after discovering what they did. So</strong></del></span> <span
class="inserted"><ins><em>has functionalities</em></ins></span> we <span
class="removed"><del><strong>cannot blame Google
+ specifically for</strong></del></span>
+ <span class="inserted"><ins><em>consider malicious, such as sending
data</em></ins></span> the <span
class="removed"><del><strong>snooping</strong></del></span> <span
class="inserted"><ins><em>user has not explicitly
asked to send.</p>
</li>
<li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>contrary, it
- worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
+ users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
+ <span class="removed"><del><strong>do.</p>
+
+ <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>can't
“fool”</em></ins></span>
+ the
+ <span class="removed"><del><strong>source code
somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
-
- <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
- text messages, read call, location</em></ins></span> and
- <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
- read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
+ them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to the
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p>
+</li>
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>security
+ of 283 Android VPN apps concluded that “in spite of the
+ promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span>
+ <span class="inserted"><ins><em>read</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -638,25 +674,30 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>injustice of their
- being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
- phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
+ Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
+ VPN apps.”</p>
- <p>Could Google</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
+ the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
+ detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to</em></ins></span> have <span
class="removed"><del><strong>done</strong></del></span> <span
class="inserted"><ins><em>GPS.)</p>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>users cannot
stop
+ them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
+ to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -670,521 +711,601 @@
<li id="M202009183">
<p>Facebook <a
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning on the device's
+ on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the
<span class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full
access</strong></del></span> <span class="inserted"><ins><em>device's
camera.</p>
</li>
<li id="M202004200">
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made</em></ins></span> a <span class="removed"><del><strong>better
job</strong></del></span> <span
class="inserted"><ins><em>practice</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
- cheating? There is no</strong></del></span> <span
class="inserted"><ins><em>surreptitiously activating the Siri software to <a
+ made a practice of surreptitiously activating the Siri
software</em></ins></span> to <span class="inserted"><ins><em><a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations when they had not activated Siri</a>.
- This was not just occasional, it was</em></ins></span> systematic <span
class="removed"><del><strong>way for Google, or Android
- users,</strong></del></span> <span
class="inserted"><ins><em>practice.</p>
-
- <p>His job was</em></ins></span> to <span
class="removed"><del><strong>inspect executable proprietary
apps</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> to <span
class="removed"><del><strong>see what they
- do.</p>
-
- <p>Google could demand the source code for</strong></del></span> these
<span class="removed"><del><strong>apps, and study the
- source code somehow to determine whether they mistreat
users</strong></del></span> <span
class="inserted"><ins><em>recordings,</em></ins></span> in
- <span class="removed"><del><strong>various ways. If it
did</strong></del></span> a <span class="removed"><del><strong>good
job</strong></del></span> <span class="inserted"><ins><em>group that made
- transcripts</em></ins></span> of <span class="removed"><del><strong>this,
it could more or less</strong></del></span> <span
class="inserted"><ins><em>them. He does not believes that Apple has ceased this
+ record</em></ins></span> users' <span class="removed"><del><strong>text
messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>conversations
when they had not activated Siri</a>.
+ This was not just occasional, it was systematic practice.</p>
+
+ <p>His job was</em></ins></span> to <span
class="removed"><del><strong>read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> to <span
class="removed"><del><strong>LinkedIn. Also, it stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em>these recordings, in a group that made
+ transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable way to</em></ins></span> prevent <span
class="removed"><del><strong>such snooping, except when</strong></del></span>
<span class="inserted"><ins><em>this is, for</em></ins></span> the <span
class="removed"><del><strong>app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>program that
- controls access</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> the <span
class="removed"><del><strong>checking.</p>
+ <p>The only reliable way</em></ins></span> to <span
class="inserted"><ins><em>prevent this is, for</em></ins></span> the <span
class="removed"><del><strong>UK government if
+ requested.</dd>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</strong></del></span> <span
class="inserted"><ins><em>microphone</em></ins></span> to <span
class="removed"><del><strong>protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>decide when the user
has
- “activated” any service,</em></ins></span> to <span
class="inserted"><ins><em>be free software, and</em></ins></span> the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p></strong></del></span>
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>program that
+ controls access</em></ins></span> to the
+ <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>microphone to decide
when</em></ins></span> the <span class="removed"><del><strong>JS injection
is</strong></del></span> <span class="inserted"><ins><em>user has
+ “activated” any service,</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>be free
software, and</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed</strong></del></span>
<span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
- sure Apple can't listen to them.</p></em></ins></span>
+ sure Apple can't listen to them.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
- <span class="inserted"><ins><em><li id="M201910131">
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to</em></ins></span> the
<span class="removed"><del><strong>privacy and security
- of 283 Android VPN apps concluded</strong></del></span> <span
class="inserted"><ins><em>Tencent Safe
- Browsing service</a>, to check URLs</em></ins></span> that <span
class="removed"><del><strong>“in spite of</strong></del></span> <span
class="inserted"><ins><em>possibly correspond to
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs</em></ins></span> that <span
class="inserted"><ins><em>possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the
- <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
- contains</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN
apps—millions</strong></del></span> <span
class="inserted"><ins><em>websites</em></ins></span> of <span
class="removed"><del><strong>users may be unawarely subject
- to poor security guarantees</strong></del></span> <span
class="inserted"><ins><em>political opponents. By linking the requests
+ with</em></ins></span> the <span class="removed"><del><strong>non-premium
version</strong></del></span> <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list most certainly
+ contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
originating from single IP addresses, the government can identify
- dissenters in China</em></ins></span> and <span
class="removed"><del><strong>abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following is a non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>Hong Kong, thus endangering their lives.</p>
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <li id="M201905280">
- <p>In spite</em></ins></span> of <span
class="removed"><del><strong>proprietary VPN</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
- privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>from
- the research paper</strong></del></span> <span
class="inserted"><ins><em>contain trackers</em></ins></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>are busy at night <a
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
+ proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information to third
parties</a>.</p></em></ins></span>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen,
Yelp</em></ins></span>
- and <span class="removed"><del><strong>infringes the
privacy</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it
is likely that most nonfree apps contain
- trackers. Some</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries</strong></del></span> <span
class="inserted"><ins><em>these send personally identifying
data</em></ins></span> such as <span class="removed"><del><strong>NativeX and
Appflood,
- meant to track users and show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>phone
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
+ trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>phone
fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
- is collected by the company, there is no telling what</em></ins></span> it
<span class="removed"><del><strong>has full access to
- users' text messages.</dd>
-
- <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>will be
- used for.</p>
+ delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
+ used for.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
- requested.</dd>
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
- <li id="M201709210">
- <p>In</em></ins></span> the
- <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
- “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>JS injection is</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>without having your fingerprints taken. Users would
have
- no way to tell whether</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
+ no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
- them from there.</p>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p></em></ins></span>
</li>
- <li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>have
- confirmed</strong></del></span> <span class="inserted"><ins><em>on
iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that the <span
class="removed"><del><strong>non-premium version of</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>app does
- JavaScript injection</strong></del></span>
- <span class="inserted"><ins><em>server records these
numbers</em></ins></span> for <span class="removed"><del><strong>tracking and
display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>at least
30 days.</p></em></ins></span>
- </li>
<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of</strong></del></span>
+<p>Google Play intentionally sends</strong></del></span>
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of</strong></del></span> <span class="inserted"><ins><em>photos
- and videos they make.</p>
-
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps</em></ins></span> them <span class="inserted"><ins><em>up
to date on all your devices. Any edits you
- make</em></ins></span> are <span class="removed"><del><strong>not in
fact</strong></del></span> <span class="inserted"><ins><em>automatically
updated everywhere. […] </p></blockquote>
-
- <p>(From</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
+ <span class="inserted"><ins><em><li id="M201609280">
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ </li>
+
+ <li id="M201509240">
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>Conditions” that spell out
+what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>make.</p>
+
+ <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>honestly
identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>video you
+ take,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
+place!</p>
</li>
-<li>
- <p>Apps for BART</strong></del></span>
- <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
-<li>
- <p>A study found 234 Android apps that track
users</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by
- <span class="removed"><del><strong><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>the
- startup of iOS</a>. The term “cloud” means “please
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ make are automatically updated everywhere. […]
</p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
+ <span class="removed"><del><strong>yet another
example</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or
played</strong></del></span>
+ <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when</strong></del></span>
<span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
- </p>
+ iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
+ unthinkable with free software.</p>
-</li>
+ </li>
-<li>
- <p>Pairs</strong></del></span> <span class="inserted"><ins><em>default
so it still counts as a
- surveillance functionality.</p>
+ <li><p>More than 73%</strong></del></span>
+ <span class="inserted"><ins><em>surveillance functionality.</p>
- <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>Android apps can collude to transmit users'
personal
- data</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span>
+ <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
- security to get at them, but NSA can access any</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>break Apple's
+ security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
+ <li id="M201409220">
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-<p>Merely asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>“consent” of users
is</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
- <p>This may have improved with <a
+ <p>This may</em></ins></span> have <span
class="removed"><del><strong>described these apps as
+ “free”—they are</strong></del></span> <span
class="inserted"><ins><em>improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>enough</strong></del></span> <span
class="inserted"><ins><em>as much as Apple claims</a>.</p>
+ not <span class="removed"><del><strong>free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple
claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>“Terms and
Conditions” that spell out
-what they are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
+ for <span class="removed"><del><strong>granted that the usual analytics
tools are
+ legitimate, but is that valid? Software developers
have</strong></del></span> no <span class="removed"><del><strong>right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>possible purpose</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not</strong></del></span> <span
class="inserted"><ins><em>than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect to 100</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
<span class="inserted"><ins><em>get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all the data in an iThing, or it
+ Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
+ turned off.</p></em></ins></span>
</li>
- <li id="M201210170">
- <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
- still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
+ <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201210170">
+ <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it is
+ still true in iOS 7.)</p></em></ins></span>
</li>
- <li id="M201204280">
- <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
+ to <span class="removed"><del><strong>any file on</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving a valid
+ email address and receiving</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
to it.</p></em></ins></span>
</li>
+</ul>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-<span class="inserted"><ins><em></ul>
+
+
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
<div class="big-subsection">
- <h4 id="SpywareInAndroid">Android Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202004300">
<p>Xiaomi phones</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li><p>In</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
+ many actions</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth the
+ obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>user takes</a>: starting an app, looking
at a folder,
+ visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>be spied on”.</p>
+ </li>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span class="inserted"><ins><em>a song. They
send device identifying
+ <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>a song. They send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
+ other streaming dis-services make a dossier about each user,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make
+ users identify themselves</em></ins></span> to <span
class="removed"><del><strong>use it without having your fingerprints
+ taken. Users would have</strong></del></span> <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
<p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
+ but we condemn this</em></ins></span> no <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent” to <a
-
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
- </li>
+ <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>tell whether the phone is snooping on
+ them.</p></li>
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
+ <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>there.</p></strong></del></span> <span
class="inserted"><ins><em>Android phones</a> while disguising
+ what the “consent” was for.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811230">
+ <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>location
data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
+ it saved up</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
</li>
- <li id="M201711210">
- <p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711210">
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></em></ins></span>
+ even <span class="removed"><del><strong>gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>when “location services” are turned
off, even when</em></ins></span>
+ the <span class="removed"><del><strong>code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>phone has no SIM
card</a>.</p></em></ins></span>
</li>
- <li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611150">
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold</em></ins></span> with <span class="removed"><del><strong>third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>spyware sending lots of data to
China</a>.</p></em></ins></span>
</li>
- <li id="M201609140">
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ tracks</em></ins></span> the <span class="removed"><del><strong>photos and
+ videos they make.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the
tracking.</em></ins></span> This is
- yet another example of nonfree software pretending to obey the user,
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video</strong></del></span>
<span class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+
+ <p>Even if</em></ins></span> you <span
class="removed"><del><strong>take,</strong></del></span> <span
class="inserted"><ins><em>disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>keeps them up to date on all your devices.
+ Any edits</strong></del></span> <span class="inserted"><ins><em>location
tracking,</em></ins></span> you <span class="removed"><del><strong>make are
automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>must
+ disable Google Play itself to completely stop</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>tracking. This</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span>
+ <span class="inserted"><ins><em>yet another example</em></ins></span> of
<span class="removed"><del><strong>many celebrities</a>. They needed to
break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>nonfree
software pretending</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the <span
class="inserted"><ins><em>user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
+ <li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p></strong></del></span>
- <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
+ </li>
+
+ <li><p>There</strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
+ transmission</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature</strong></del></span> <span
class="inserted"><ins><em>substantial expense</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span class="inserted"><ins><em>users.
Said transmission,
+ not wanted or requested</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
+ is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>the user, clearly must constitute spying
of some kind.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a></strong></del></span>
<span class="inserted"><ins><em><li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>system.</p>
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
- “zero price” is “gratis.”</p>
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us</em></ins></span> by <span
class="removed"><del><strong>default, though</strong></del></span> <span
class="inserted"><ins><em>a paywall) reports</em></ins></span> that <span
class="inserted"><ins><em><a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</em></ins></span> can <span class="removed"><del><strong>be
+ turned off.</p>
+ </li>
- <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
- Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>remotely activate the GPS</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>microphone in Android phones
+ and laptops</a> (presumably Windows laptops). Here
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
- and <span class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably Windows laptops). Here
is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is present in some Android devices when
they are
- sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
- by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
+
+ <li id="M201307280">
+ <p>Spyware is present in</em></ins></span> some <span
class="inserted"><ins><em>Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- <span class="removed"><del><strong>send</strong></del></span>
- <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Some</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307250">
+ <li id="M201307250">
<p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens</em></ins></span> for <span class="inserted"><ins><em>voice
all</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150">
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>personal details of
users that install</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
- <p>Merely asking the “consent” of users is not enough to
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>totally
incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>not enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ honestly identify the information it collects on users,
instead</em></ins></span> of <span class="removed"><del><strong>iOS
seem</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ and</em></ins></span> other <span class="removed"><del><strong>than
surveillance</a>. Here is</strong></del></span> <span
class="inserted"><ins><em>companies from getting this personal information
in</em></ins></span> the
+ <span class="inserted"><ins><em>first place!</p>
</li>
<li id="M201111170">
- <p>Some</em></ins></span> manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+<div class="big-subsection">
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li id="M201410080">
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201410080">
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send</em></ins></span> lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ needed</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even</em></ins></span> which <span
class="removed"><del><strong>enable them to turn</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>user reads at
what time</a>.</p>
</li>
</ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>The DMCA</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast and AVG extensions
- for Firefox and Chrome were found to <a
+ <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
+ for Firefox and Chrome were found</em></ins></span> to <span
class="inserted"><ins><em><a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span class="inserted"><ins><em>Google
- removed</em></ins></span> the <span class="removed"><del><strong>EU
Copyright Directive make</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location
data</strong></del></span> <span class="inserted"><ins><em>problematic
extensions</em></ins></span> from <span class="inserted"><ins><em>their stores,
but this shows
once more how unsafe nonfree software can be. Tools that are supposed
- to protect a proprietary system are, instead, infecting</em></ins></span>
it <span class="inserted"><ins><em>with
- additional malware (the system itself being the original
malware).</p>
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
</li>
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because</strong></del></span> <span class="inserted"><ins><em>identify who is
running it</a>. The result is
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that</em></ins></span> this
- <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
+ <p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <span
class="removed"><del><strong><li><p>In</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1194,62 +1315,45 @@
<ul class="blurbs">
<li id="M202003010">
<p>The Alipay Health Code app
- estimates whether</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19</em></ins></span> and <span class="removed"><del><strong>Bluetooth the
- obvious way</strong></del></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ estimates whether the user has Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
tells the cops directly</a>.</p>
</li>
<li id="M202001290">
- <p>The Amazon Ring app</em></ins></span> does <span
class="removed"><del><strong>turn them off—only until 5am.
- That's Apple</strong></del></span> <span class="inserted"><ins><em><a
+ <p>The Amazon Ring app does <a
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance</em></ins></span> for <span
class="removed"><del><strong>you—“We know you
want</strong></del></span> <span class="inserted"><ins><em>other companies as
well as for Amazon</a>.</p>
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
<li id="M201912220">
- <p>The ToToc messaging app seems</em></ins></span> to be <span
class="removed"><del><strong>spied on”.</p>
- </li>
-
- <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ <p>The ToToc messaging app seems to be a <a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
spying tool for the government of the United Arab Emirates</a>.
Any nonfree program could be doing this, and that is a good
- reason</em></ins></span> to use <span class="removed"><del><strong>it
without having your fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>free software instead.</p>
+ reason to use free software instead.</p>
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>phone is</strong></del></span> <span
class="inserted"><ins><em>word “free” in
+ <p><small>Note: this article uses the word “free”
in
the sense of “gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"></em></ins></span>
- snooping <span class="inserted"><ins><em>and sabotage
capabilities</a> if they install their own
- software</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data</strong></del></span> <span
class="inserted"><ins><em>the device. Many employers demand</em></ins></span>
to <span class="removed"><del><strong>Apple's servers</a>. Big Brother
can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>do this. For the
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p></em></ins></span>
+ and as dangerous as any other nonfree software.</p>
</li>
- <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<p>The Chinese Communist Party's “Study
- the Great Nation”</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to
contain</em></ins></span> a <span class="removed"><del><strong>server every
phone number</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish in the users'
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
@@ -1257,213 +1361,122 @@
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
- saying</em></ins></span> that the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on</em></ins></span> the
<span class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>Android version
+ saying that the tests were only performed on the Android version
of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p></em></ins></span>
+ Apple's operating system.”</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909091">
- <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users</em></ins></span> even <span
class="removed"><del><strong>gratis apps)</a>
- without</strong></del></span> <span class="inserted"><ins><em>when it is
turned off</a>, after tricking them
- into</em></ins></span> giving <span class="removed"><del><strong>a valid
email address and receiving</strong></del></span> the <span
class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>app broad
permissions in order</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>use one</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>its
+ <li id="M201909091">
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
functionalities.</p>
</li>
<li id="M201909090">
- <p>Some nonfree period-tracking</em></ins></span> apps <span
class="inserted"><ins><em>including MIA Fem and Maya</em></ins></span> <a
<span class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
- </li>
-
- <li><p>iThings automatically upload to Apple's servers all the
photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>users' lives</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated by the
- startup</strong></del></span> <span class="inserted"><ins><em>a
form</em></ins></span> of <span class="removed"><del><strong>iOS</a>. The
term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>surveillance. There</em></ins></span> is a <span
class="removed"><del><strong>way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span>
- <span class="inserted"><ins><em>proprietary program for
adjusting</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown</strong></del></span> <span
class="inserted"><ins><em>certain telescopic rifle sight. <a
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of all the 10,000 or
more</em></ins></span> people <span class="removed"><del><strong>apparently
took advantage</strong></del></span>
- <span class="inserted"><ins><em>who have installed it</a>.</p>
+ A US prosecutor has demanded the list of all the 10,000 or more people
+ who have installed it</a>.</p>
- <p>With a free program there would not be a list</em></ins></span>
of <span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>who has installed
+ <p>With a free program there would not be a list of who has installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features</em></ins></span>
- of <span class="removed"><del><strong>many celebrities</a>. They
needed to break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>the
operating system, in order</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>gather as much private data as
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
- <p>Thus, we can't trust rules against spying. What
we</em></ins></span> can <span class="removed"><del><strong>access any of them
through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>software we
run.</p>
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users' movements even when</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>user says <a
+ users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>secretly</em></ins></span> a <span
class="removed"><del><strong>feature for web sites to track users, which
is</strong></del></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a></em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
- is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>natalist Christians. It spreads distrust
+ <li id="M201905300">
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ programs.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
requirement to run a proprietary phone app</a> to be allowed into
the event.</p>
- <p>This app is a spyware</em></ins></span> that can <span
class="removed"><del><strong>be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>snoop on a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>contact list, and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
+ <li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the
- data <span class="removed"><del><strong>in an iThing,
- or it</strong></del></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>“anonymized and aggregated,” it can
easily be
- traced back</em></ins></span> to <span
class="removed"><del><strong>exist</strong></del></span> <span
class="inserted"><ins><em>the woman who uses the app.</p>
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
+ <p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less</em></ins></span> the
- <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul>
- <li><p>Tracking software in popular Android
apps</strong></del></span> <span class="inserted"><ins><em>same thing without
- spying on you</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around</strong></del></span>
- <span
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>physical store by noticing WiFi
- networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>new one is being
developed</a>.</p></em></ins></span>
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google</em></ins></span> tracks <span
class="removed"><del><strong>location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span> the <span class="removed"><del><strong>phone
has no SIM card</a>.</p></li>
-
- <li><p>Some portable</strong></del></span> <span
class="inserted"><ins><em>movements of Android</em></ins></span> phones <span
class="inserted"><ins><em>and iPhones
- running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible
for</em></ins></span> sending <span
class="removed"><del><strong>lots</strong></del></span>
- <span class="inserted"><ins><em>the location data to Google.</p>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number</em></ins></span> of
<span class="inserted"><ins><em><a
+ <p>Many Android phones come with a huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="inserted"><ins><em>without
+ preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have
access</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span>
- <span class="inserted"><ins><em>the network but no direct access to the
data. This results in massive
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>,
which</em></ins></span> can <span class="removed"><del><strong>take over
smartphones</a>
- by sending hidden text messages</strong></del></span> <span
class="inserted"><ins><em>use it
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
@@ -1474,10 +1487,10 @@
<li id="M201902230">
<p>Facebook offered a convenient proprietary
- library for building mobile apps,</em></ins></span> which <span
class="removed"><del><strong>enable them</strong></del></span> <span
class="inserted"><ins><em>also <a
+ library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>personal
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
<p>It shows that no one can trust a nonfree program, not even the
@@ -1485,21 +1498,19 @@
</li>
<li id="M201902140">
- <p>The AppCensus database gives information</em></ins></span> on
<span class="inserted"><ins><em><a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>off, listen
to</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the
- <span class="removed"><del><strong>GPS,</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to</em></ins></span> take <span
class="removed"><del><strong>photographs, read text messages, read call,
location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>action. This proves
+ and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
@@ -3815,7 +3826,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:09 $
+$Date: 2020/11/02 15:02:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.349
retrieving revision 1.350
diff -u -b -r1.349 -r1.350
--- proprietary-surveillance.de.po 17 Oct 2020 08:05:09 -0000 1.349
+++ proprietary-surveillance.de.po 2 Nov 2020 15:03:00 -0000 1.350
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -534,6 +534,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a href=\"http://www.bbc.com/news/"
"technology-42309371\">includes a proprietary keyboard driver with a key "
"logger in it</a>."
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-surveillance.es.po 18 Oct 2020 09:59:20 -0000 1.91
+++ proprietary-surveillance.es.po 2 Nov 2020 15:03:00 -0000 1.92
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-10-18 11:38+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -388,6 +389,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a href=\"http://www.bbc.com/news/"
"technology-42309371\">includes a proprietary keyboard driver with a key "
"logger in it</a>."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.551
retrieving revision 1.552
diff -u -b -r1.551 -r1.552
--- proprietary-surveillance.fr.po 17 Oct 2020 08:29:20 -0000 1.551
+++ proprietary-surveillance.fr.po 2 Nov 2020 15:03:00 -0000 1.552
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -381,6 +382,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a href=\"http://www.bbc.com/news/"
"technology-42309371\">includes a proprietary keyboard driver with a key "
"logger in it</a>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary-surveillance.it-diff.html 17 Oct 2020 08:05:10 -0000
1.201
+++ proprietary-surveillance.it-diff.html 2 Nov 2020 15:03:00 -0000
1.202
@@ -276,6 +276,15 @@
files</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -292,11 +301,11 @@
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
by force setting the telemetry mode to
“Full”</a>.</p>
- <p>The <a
-
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+ engineers to access, among other things, registry keys <a
+
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
which can contain sensitive information like administrator's login
password</a>.</p>
</li>
@@ -402,20 +411,25 @@
<li><p></strong></del></span> <span
class="inserted"><ins><em>ads.</p>
- <p>We can suppose</em></ins></span> Microsoft <span
class="inserted"><ins><em>look at users' files for the US government
+ <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>uses Windows 10's “privacy policy” to
overtly impose a
+ “right” to</strong></del></span> look at users' files <span
class="removed"><del><strong>at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is</strong></del></span> <span
class="inserted"><ins><em>for the US government
on demand, though the “privacy policy” does not explicitly
say so. Will it look at users' files for the Chinese government
on demand?</p>
</li>
<li id="M201506170">
- <p>Microsoft</em></ins></span> uses Windows 10's “privacy
policy”
+ <p>Microsoft uses Windows 10's “privacy policy”
to overtly impose a “right” to look at
- users' files at any time. Windows 10 full disk encryption <a <span
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"></em></ins></span>
+ users' files at any time. Windows 10 full disk encryption <a
+
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">
gives Microsoft a key</a>.</p>
- <p>Thus, Windows is overt malware in regard to surveillance, as in
+ <p>Thus, Windows is</em></ins></span> overt malware in regard to
surveillance, as in
other issues.</p>
<p>We can suppose Microsoft look at users' files for the US
government
@@ -566,13 +580,12 @@
<p>The article confusingly describes gratis apps as “free”,
but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
- <a href="/philosophy/free-sw.html">free software</a>.
+ sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
+ “clean” Windows install is not really clean
since</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
It also uses the ugly word “monetize”. A good replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
- “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
own malware</a>.</p></em></ins></span>
</li>
@@ -599,49 +612,48 @@
Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
especially nasty malware, helping companies snoop</em></ins></span> on
<span class="removed"><del><strong>users</a>.</p>
- <p>With free software apps,</strong></del></span> users <span
class="removed"><del><strong>could <em>make sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>as well
+ <p>With free software apps,</strong></del></span> users <span
class="removed"><del><strong>could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>as well
as snooping on them itself</a>.</p>
- <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps</strong></del></span> <span
class="inserted"><ins><em>Biden's app has a less manipulative overall
- approach, but</em></ins></span> that <span
class="removed"><del><strong>track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>does not tell us whether it has
functionalities we
+ <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
+ approach, but</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>does not tell us whether it has functionalities we
consider malicious, such as sending data the user has not explicitly
- asked</em></ins></span> to <span class="removed"><del><strong>ultrasound
from beacons placed in stores or played by TV programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>send.</p></em></ins></span>
+ asked to send.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
<span class="inserted"><ins><em><li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
- data to servers.</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <p>The natural extension of monitoring
+ people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>make
sure they can't “fool”
the monitoring</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+ <p>Pairs of Android apps</strong></del></span>
<span class="inserted"><ins><em><li id="M201510050">
- <p>According to Edward Snowden,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
smartphones</a> by sending hidden text messages which enable
- them to turn</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>phones on and
off, listen to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+ them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that collude</a>.</p>
+</li>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read the contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -711,94 +723,83 @@
<p>The article should</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
- This was not just occasional, it was systematic practice.</p>
-
- <p>His job was to listen to</em></ins></span> these <span
class="removed"><del><strong>apps as
- “free”—they are</strong></del></span> <span
class="inserted"><ins><em>recordings, in a group that made
- transcripts of them. He does</em></ins></span> not <span
class="removed"><del><strong>free software. The clear</strong></del></span>
<span class="inserted"><ins><em>believes that Apple has ceased this
- practice.</p>
+ record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described these apps as
+ “free”—they are</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
+ This was</em></ins></span> not <span class="removed"><del><strong>free
software. The clear way</strong></del></span> <span
class="inserted"><ins><em>just occasional, it was systematic practice.</p>
+
+ <p>His job was</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in a group that made
+ transcripts of them. He does not believes that Apple has ceased this
+ practice.</p></em></ins></span>
- <p>The only reliable</em></ins></span> way to <span
class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>prevent this is,</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
+ <p>The <span class="removed"><del><strong>article
takes</strong></del></span> <span class="inserted"><ins><em>only reliable way
to prevent this is,</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
legitimate, but is</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no
right</strong></del></span>
<span class="inserted"><ins><em>controls access</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as</strong></del></span> <span class="inserted"><ins><em>the
microphone to decide when the user has
- “activated”</em></ins></span> any <span
class="removed"><del><strong>other snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span
class="inserted"><ins><em>service,</em></ins></span> to <span
class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>be free software,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola phones modify Android</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
- sure Apple can't listen</em></ins></span> to <span
class="inserted"><ins><em>them.</p>
+ <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>the microphone to decide when the user has
+ “activated” any service, to be free software, and the
+ operating system under it free as well. This way,</em></ins></span> users
<span class="removed"><del><strong>are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>could make
+ sure Apple can't listen to them.</p>
</li>
<li id="M201910131">
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing</em></ins></span> data <span class="inserted"><ins><em>from
Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs</em></ins></span> that <span
class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>possibly correspond to
“fraudulent” websites. Since Tencent collaborates
with the Chinese government, its Safe Browsing black list most certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ <span class="removed"><del><strong><li><p>Gratis
Android</strong></del></span>
<span class="inserted"><ins><em><li id="M201905280">
<p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span>
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>(but not</strong></del></span> <span
class="inserted"><ins><em>contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data</em></ins></span>
such as <span class="removed"><del><strong>Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p></em></ins></span>
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ and DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most
nonfree apps contain
+ trackers.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em>of these</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>personally identifying</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package</strong></del></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
+ </li>
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>any
file</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy</em></ins></span> on <span
class="inserted"><ins><em>users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>phone
+ fingerprint, exact location, email address, phone number or even
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<!-- WEBMASTERS:</strong></del></span>
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>sure to place new items on top under each
subsection -->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -810,7 +811,17 @@
</div>
<ul>
- <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li id="M201709210">
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want to be spied on”.</p>
</li>
<li id="M201702150">
@@ -852,10 +863,10 @@
behavioral and location information</a> of their users with third
parties.</p>
</li>
- <li><p>iThings automatically upload</strong></del></span>
+ <li><p>iThings</strong></del></span>
<span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to Apple's servers
all the photos
+ <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -973,90 +984,92 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden text messages which enable them to turn
the</strong></del></span>
+ <li><p>According to Edward Snowden,</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi</em></ins></span> phones
- <span class="removed"><del><strong>on and off, listen
to</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location
data</strong></del></span> <span class="inserted"><ins><em>user
takes</a>: starting an app, looking at a folder,
- visiting a website, listening to a song. They send device identifying
+ <p>Xiaomi phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to
turn</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions</em></ins></span> the <span
class="removed"><del><strong>phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>the microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>a song. They
send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
+ <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>web
+ browsing history,</strong></del></span>
+ <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em><a
href="/malware/proprietary-surveillance.html#M201508210"> they make
users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
+ <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>same wrongs when
the culprits are not Chinese,
but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent” to <a
+ <p>Facebook's app got “consent”</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p>
+ upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>Android phones</a> while disguising
+ what the “consent” was for.</p></em></ins></span>
</li>
- <li id="M201811230">
+ <span class="removed"><del><strong><li><p>Samsung phones come
with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ in airplane mode. It didn't</em></ins></span> send <span
class="removed"><del><strong>so much</strong></del></span> <span
class="inserted"><ins><em>the location</em></ins></span> data <span
class="removed"><del><strong>that their transmission is a
+ substantial expense</strong></del></span> <span
class="inserted"><ins><em>while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up the data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
- <p>Android tracks location for Google <a
+ <p>Android tracks location</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="removed"><del><strong>user, clearly must constitute
spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola</strong></del></span> phone <span
class="inserted"><ins><em>has no SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ tracks</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>users' movements without their
permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung</em></ins></span> phones come with <a
+ <li id="M201507030">
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
+ of some kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file on the
system.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
@@ -1099,70 +1112,97 @@
<li id="M201302150">
<p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
+ <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>users is not enough</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span>
<span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>user's
list</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ reading</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions”</em></ins></span>
that <span class="inserted"><ins><em>spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users,
instead</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span>
+ honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install</strong></del></span> <span
class="inserted"><ins><em>collects</em></ins></span> on <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
+ information about the users' searches that</strong></del></span>
<span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
- <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <p>However, to truly protect people's privacy, we must
prevent</em></ins></span> Google <span class="removed"><del><strong>normally
gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
+ and <span class="inserted"><ins><em>other companies from getting this
personal information in</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
</li>
- <li id="M201111170">
- <p>Some manufacturers add a <a
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp appears to do lots of surveillance,
judging</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
</li>
<li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used</em></ins></span> by <span
class="inserted"><ins><em>most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</em></ins></span> data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</em></ins></span> of data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
+ alter them too</a>.
+ </p></li>
- <li>
- <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets
when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"></em></ins></span>
they <span class="removed"><del><strong>use its search engine.</p>
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>report even which page</em></ins></span>
the <span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
+ <p>This example illustrates</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
@@ -1182,45 +1222,32 @@
<ul class="blurbs">
<li id="M201912190">
<p>Some Avast and AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>users'
detailed browsing habits</a>. Mozilla</em></ins></span> and <span
class="inserted"><ins><em>Google
- removed</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
- once more how unsafe nonfree software can be. Tools that are supposed
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
+ once more</em></ins></span> how <span
class="removed"><del><strong>“getting</strong></del></span> <span
class="inserted"><ins><em>unsafe nonfree software can be. Tools that are
supposed
to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>original malware).</p></em></ins></span>
+ additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>original malware).</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
- often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>legal threat
demanding a lot of money.</p>
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used for repression of forbidden sharing
+ <p>The fact that this is used</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>repression of forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is</em></ins></span> not <span class="removed"><del><strong>only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>a cure
for the injustice</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>nonfree software. It
may avoid
- paying for</em></ins></span> the <span class="removed"><del><strong>phone,
and in server accounts,</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it
<span class="removed"><del><strong>can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>less nasty.</p>
+ <p>This illustrates that making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1229,214 +1256,149 @@
<ul class="blurbs">
<li id="M202003010">
- <p>The Alipay Health Code</em></ins></span> app <span
class="removed"><del><strong>tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span>
- <span class="inserted"><ins><em>estimates whether</em></ins></span> the
<span class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19 and <a
-
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="removed"><del><strong>user's
consent”
- for</strong></del></span> <span class="inserted"><ins><em>cops
directly</a>.</p>
+ <p>The Alipay Health Code</em></ins></span> app
+ <span class="inserted"><ins><em>estimates whether the user has Covid-19
and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p></em></ins></span>
</li>
- <li id="M202001290">
- <p>The Amazon Ring app does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
- surveillance <span class="removed"><del><strong>is
inadequate</strong></del></span> <span class="inserted"><ins><em>for other
companies</em></ins></span> as <span class="removed"><del><strong>a protection
against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202001290">
+ <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
+ surveillance <span class="removed"><del><strong>software snoop on what
radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such</strong></del></span> <span class="inserted"><ins><em>for other
companies</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+ and Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Google's new
voice</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
<span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc</em></ins></span> messaging app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance</strong></del></span>
+ <p>The ToToc messaging</em></ins></span> app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and that is a good
- reason to use free</em></ins></span> software <span
class="removed"><del><strong>snoop on what radio</strong></del></span> <span
class="inserted"><ins><em>instead.</p>
+ spying tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>the
government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>that is a good
+ reason</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>use free software instead.</p>
+
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
+ is</strong></del></span> <span class="inserted"><ins><em>word
“free”</em></ins></span> in
+ the <span class="removed"><del><strong>frame.</p>
- <p><small>Note: this article uses the word “free”
in
- the sense of “gratis.”</small></p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
</li>
<li id="M201912090">
- <p>iMonsters</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>Android phones,
+ <p>iMonsters and Android phones,
when used for work, give employers powerful <a
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on <span class="removed"><del><strong>various
sites
- such</strong></del></span> <span class="inserted"><ins><em>the device.
Many employers demand to do this. For the
- employee, this is simply nonfree software,</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>fundamentally unjust</em></ins></span>
- and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>as dangerous as any other nonfree
software.</p></em></ins></span>
+ snooping and sabotage capabilities</a></em></ins></span> if <span
class="inserted"><ins><em>they install their own
+ software on</em></ins></span> the <span class="removed"><del><strong>user
didn't “upload” them</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand</em></ins></span> to
<span class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>service.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+ <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span>
+ <span class="inserted"><ins><em>employee, this</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware
(DRM</strong></del></span> <span class="inserted"><ins><em>simply nonfree
software, as fundamentally unjust</em></ins></span>
+ and <span class="removed"><del><strong>snooping). In August
+ 2015</strong></del></span> <span class="inserted"><ins><em>as dangerous
as any other nonfree software.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<p>The Chinese Communist Party's “Study
- the Great Nation”</em></ins></span> app <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile</strong></del></span>
+ the Great Nation” app requires users to grant</em></ins></span> it
<a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the</em></ins></span> phone's <span
class="removed"><del><strong>photo collections for known
faces</a>,</strong></del></span> <span
class="inserted"><ins><em>microphone, photos, text messages, contacts, and
- internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>suggests you to share</strong></del></span> the
<span class="removed"><del><strong>picture you take
according</strong></del></span> <span class="inserted"><ins><em>Android version
was found</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>contain a
- back-door allowing developers to run any code they wish</em></ins></span>
in the <span class="removed"><del><strong>frame.</p>
+ access</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>the
phone's microphone, photos, text messages, contacts, and
+ internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting to realize that it is nasty.</p>
- <p>This spyware feature seems to require online access
to</strong></del></span> <span class="inserted"><ins><em>users'
+ <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>Android version was found to
contain</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing
developers</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether</strong></del></span> <span class="inserted"><ins><em>run any
code</em></ins></span> they <span class="removed"><del><strong>want that. This
is a typical example of</strong></del></span> <span
class="inserted"><ins><em>wish in</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>users'
phone, as “superusers.” Downloading and using this
- app is mandatory at</em></ins></span> some
- <span class="removed"><del><strong>known-faces database, which
means</strong></del></span> <span
class="inserted"><ins><em>workplaces.</p>
+ app is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that</em></ins></span> the <span class="removed"><del><strong>wire
to Facebook's servers</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android version
- of the app,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this
kind</em></ins></span> of
- <span class="inserted"><ins><em>‘superuser’ surveillance could
not be conducted on
- Apple's operating system.”</p>
- </li>
-
- <li id="M201909091">
- <p>The</em></ins></span> Facebook <span
class="removed"><del><strong>users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users</em></ins></span> even <span class="removed"><del><strong>if
the user didn't “upload”</strong></del></span> <span
class="inserted"><ins><em>when it is turned off</a>, after
tricking</em></ins></span> them <span
class="removed"><del><strong>to</strong></del></span>
- <span class="inserted"><ins><em>into giving</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>app broad permissions in order to use one of its
- functionalities.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>snooping). In
August
- 2015 it</strong></del></span> <span
class="inserted"><ins><em>Maya</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- </li>
-
- <li id="M201909060">
- <p>Keeping track of who downloads</em></ins></span> a <span
class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>proprietary
- program</em></ins></span> is a <span class="removed"><del><strong>typical
example</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="inserted"><ins><em>surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>list</em></ins></span> of <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they</strong></del></span> <span class="inserted"><ins><em>10,000
or more people
- who</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
+ Washington Post version</em></ins></span> of the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
</li>
<li><p>Many proprietary apps for mobile devices report which
other
- apps the user</strong></del></span> <span
class="inserted"><ins><em>installed it</a>.</p>
-
- <p>With a free program there would not be a list of
who</em></ins></span> has
- <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>installed
- it.</p>
- </li>
-
- <li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>.
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing
features
- of the operating system, in order to gather</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>much private data</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span>
- <span class="inserted"><ins><em>they possibly can.</p>
-
- <p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>at least
is visible and
+ optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
</li>
<li><p>FTC says most mobile apps for children don't respect
privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>software we run.</p></em></ins></span>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907080">
- <p>Many Android</em></ins></span> apps <span
class="removed"><del><strong>snoop on</strong></del></span> <span
class="inserted"><ins><em>can track
- users' movements even when</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS</strong></del></span> <span
class="inserted"><ins><em>allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>the
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>tests were only performed</em></ins></span> on the
<span class="removed"><del><strong>user</a>. This is in addition to
+ the snooping done by</strong></del></span> <span
class="inserted"><ins><em>Android version
+ of</em></ins></span> the <span class="removed"><del><strong>phone
company,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
phone.</p>
- <p>Don't be distracted</strong></del></span> <span
class="inserted"><ins><em>Android,
- exploited intentionally</em></ins></span> by <span
class="removed"><del><strong>the question of whether the app developers get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>malicious apps.</p></em></ins></span>
+ <p>Don't be distracted by the question of whether the app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em>that,
according</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>propaganda</a></em></ins></span> by <span
class="removed"><del><strong>companies.</a></p>
-
- <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>natalist Christians.
It spreads distrust
- for contraception.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ <span class="inserted"><ins><em><li id="M201909091"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when</em></ins></span> it <span
class="removed"><del><strong>asked the user to
+ approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
+ into giving</em></ins></span> the app <span
class="removed"><del><strong>developer but did not
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>its
+ functionalities.</p>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>run a proprietary
phone app</a></em></ins></span> to <span class="inserted"><ins><em>be
allowed into</em></ins></span>
- the <span class="inserted"><ins><em>event.</p>
-
- <p>This</em></ins></span> app <span
class="removed"><del><strong>developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"></em></ins></span>
+ send <span class="removed"><del><strong>any
information</strong></del></span> <span class="inserted"><ins><em>intimate
details of users' lives</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,”</em></ins></span> it
<span class="inserted"><ins><em>can easily be
- traced back</em></ins></span> to <span class="removed"><del><strong>other
companies. This shows</strong></del></span> the
- <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
-
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>surveillance:
why should</strong></del></span> <span class="inserted"><ins><em>equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
- <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"></em></ins></span>
+ A <span class="inserted"><ins><em>US prosecutor has demanded the list of
all the 10,000 or more people
+ who have installed it</a>.</p>
+
+ <p>With a</em></ins></span> free <span
class="removed"><del><strong>software flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>program
there</em></ins></span> would <span
class="removed"><del><strong>not.</p></strong></del></span> <span
class="inserted"><ins><em>not be a list of who has installed
+ it.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1445,41 +1407,49 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>that does more
or less the same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>then sends personal</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
+ of the operating system, in order to gather as much
private</em></ins></span> data <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
+ </li>
+
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending
- the location data to Google.</p>
- </li>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool</em></ins></span> for <span class="removed"><del><strong>companies,
and the NSA takes advantage to spy through it too</a>.
+ Here's information</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ for contraception.</p>
- <li id="M201903251">
- <p>Many Android phones come with a huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass</em></ins></span> it <span
class="removed"><del><strong>too</a>.
- Here's information</strong></del></span> on
+ <p>It snoops</em></ins></span> on
<span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1489,142 +1459,204 @@
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have access
to</em></ins></span>
- the <span class="removed"><del><strong>U.S.</p>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>toys with a mobile
phone.</strong></del></span> <span
class="inserted"><ins><em>data.</em></ins></span> This <span
class="removed"><del><strong>would
- enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>results</em></ins></span> in <span
class="inserted"><ins><em>massive
- surveillance</em></ins></span> on <span class="removed"><del><strong>a
child's speech, and even speak
- into</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>user has absolutely no
control.</p></em></ins></span>
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a> to be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>toys with</strong></del></span>
<span class="inserted"><ins><em>event.</p>
+
+ <p>This app is</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>lot of
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>even speak
+ into</strong></del></span> <span class="inserted"><ins><em>contact list,
and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
- <span class="inserted"><ins><em><li id="M201903201"></em></ins></span>
- <p>A <span class="removed"><del><strong>computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
- <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>The app was reporting the temperature of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute
by
+ minute (thus, indirectly, whether</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="removed"><del><strong>was
surrounded by a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
+ standard with which manufacturers would</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to</em></ins></span> make <span
class="removed"><del><strong>statements about</strong></del></span> their <span
class="removed"><del><strong>products, rather than free software which users
could have
checked and changed.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>19</em></ins></span> of <span
class="inserted"><ins><em>them <a
-
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive</em></ins></span> personal <span
class="removed"><del><strong>information about how
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
people used it</a>.</p>
- <p>The company's statement that it was anonymizing
the</strong></del></span> data <span class="removed"><del><strong>may be
- true, but</strong></del></span> <span class="inserted"><ins><em>to third
parties</a>, which can use</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
- medical condition.</p>
+ <p>The company's statement that it was
anonymizing</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
+ </li>
- <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="removed"><del><strong>had sold the data</strong></del></span>
<span class="inserted"><ins><em>is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient</em></ins></span> to <span
class="inserted"><ins><em>legitimize snooping.</p>
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
+
+ <p>Nonfree software in the phone has to</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
+ the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
</li>
- <li id="M201902230">
- <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to Facebook</a>. Lots of companies built apps
that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="inserted"><ins><em>personal</em></ins></span>
- data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>they collected</em></ins></span> would <span
class="removed"><del><strong>have been able to figure out
- who the user was.</p>
+ <li id="M201903251">
+ <p>Many Android phones come with</em></ins></span> a <span
class="inserted"><ins><em>huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on
to user-installed apps that</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who</strong></del></span>
+ the <span class="removed"><del><strong>user was.</p>
<p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>network but no direct access
to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which the user</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
+ </li>
- <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even the
- developers</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ medical condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>access the data</a>
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
+ way <span class="removed"><del><strong>to access the data</a>
collected by the manufacturer's snooping.</p>
- <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+ <p>That the manufacturer</strong></del></span> and <span
class="inserted"><ins><em>released them, apparently not realizing that
all</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable by itself.</p></li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
</li>
+</ul>
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>Low
Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>preventing nonfree software developers
from including malware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+<li><p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p>
+ </li>
+
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
+ there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ </li>
+
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
+ source code—often used for invasive advertising—that could
+ potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1638,18 +1670,15 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>them
was designed to make uninstallation
- difficult.</p>
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because</strong></del></span> <span class="inserted"><ins><em>10
gratis VPN apps have lousy privacy policies</a>.</p>
- <p>Users should of course uninstall these dangerous apps
if</em></ins></span> they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
+ <p><small>(It is unfortunate that these articles talk about
“free
+ apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>haven't yet, but they should also stay
away from nonfree apps</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>are <em>not</em></em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1660,35 +1689,26 @@
</div>
<ul>
- <li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901050">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>.</em></ins></span> The
<span class="removed"><del><strong>Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1700,21 +1720,14 @@
<ul>
<li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p><small>(It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>company</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p>
- </li>
+ <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>will do
+ with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data.</p>
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>to outsmart
+ <p>We think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
you.</p>
</li>
</ul>
@@ -1725,21 +1738,31 @@
</div>
<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue.
What the company does
+ with the data is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
+
+ <p><a
+
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p>
+ </li>
+
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>will do
- with</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>user's actions to Facebook</a>.</p>
- <p>We think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>user reads at
what time</a>.</p>
+ <p>Often</em></ins></span> they <span
class="removed"><del><strong>report even which page</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>company
does
- with</em></ins></span> the <span class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>e-reader used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of</strong></del></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
@@ -1748,99 +1771,104 @@
</ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>is a secondary
issue. The principal wrong here is that
- the company gets that data at all.</p>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>the app; others only
say that the user is
+ using that app, but that alone is often quite informative.</p>
- <p><a
-
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and
WeatherBug,</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
snooping devices</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>tracking people's
locations.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted
them</a>.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
settings</a>.</p>
<p>That's easy to do because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>system
has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span>
- <span class="inserted"><ins><em>Facebook can correlate</em></ins></span>
the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>demands blind faith</strong></del></span> <span
class="inserted"><ins><em>obtains</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
-
- <p>Even if no one connects to the car
remotely,</strong></del></span> the <span class="removed"><del><strong>cell
phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>same
machine via
- various apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>phone company to
track</strong></del></span> <span class="inserted"><ins><em>user's activities
in</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>app; others only say
that</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span>
is <span class="removed"><del><strong>possible to physically
remove</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
-
- <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
- account.</p></em></ins></span>
- </li>
-
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>system has
no authentication</strong></del></span> <span class="inserted"><ins><em>user's
location even</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>users disable “location
+ tracking”</a>.</p>
- <p>The case</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>tricked by</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>invasion
isn't done by malware. The other
- cases mentioned</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
- tracking”</a>.</p>
+ <li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
- <p>There</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware in the
car.</p></li>
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>other ways</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>turn
off</em></ins></span> the <span
class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>other kinds of</em></ins></span> location <span
class="removed"><del><strong>at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information,</strong></del></span>
- <span class="inserted"><ins><em>tracking,</em></ins></span> but <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>most users will be tricked by</em></ins></span> the
<span class="removed"><del><strong>state orders it to get</strong></del></span>
<span class="inserted"><ins><em>misleading control.</p>
- </li>
+ <p>This makes them act as spies for licensing enforcement.</p>
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
+ <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But we can't be sure from</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
</li>
-</ul>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect</em></ins></span> information about <span
class="removed"><del><strong>drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
-
- <p>This makes them act as spies for licensing enforcement.</p>
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really a matter of</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
+ source code they cannot look at.</em></ins></span> The other
+ <span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
+ in <span class="removed"><del><strong>the car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
+
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
+ need to get rid of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>c.</a>). The company says it
doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
- <p>We expect it implements DRM, too—that there is no way to
save
- a recording. But we can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -1850,167 +1878,157 @@
<ul>
<li><p>Nest thermometers
- send</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit in
- many ways. This is one more.</p>
- </li>
+ send</strong></del></span>
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were
found to snoop
- and collect information</em></ins></span> about <span
class="inserted"><ins><em>its users</a>. 40% of</em></ins></span> the
<span class="removed"><del><strong>user</a>.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> were <span
class="removed"><del><strong>programmed</strong></del></span>
- <span class="inserted"><ins><em>found</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
+ <p>Grindr should not have so much information</em></ins></span>
about <span class="inserted"><ins><em>its users.
+ It could be designed so that users communicate such info to each
+ other but not to</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
- source code they cannot look at.</em></ins></span> The other <span
class="removed"><del><strong>day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the</strong></del></span> <span
class="inserted"><ins><em>apps might be snooping
- in</em></ins></span> other <span class="removed"><del><strong>way.”
Evidently that was
-before Amazon “smart” TVs.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to</strong></del></span>
-<ul>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that</strong></del></span> <span
class="inserted"><ins><em>ways.</p>
+ <span class="inserted"><ins><em><li id="M201803050">
+ <p>The moviepass app and dis-service</em></ins></span>
+ spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>viewed on them,</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>cable</a>. Even
if</strong></del></span> the <span class="removed"><del><strong>image is
coming</strong></del></span> <span class="inserted"><ins><em>proprietary apps
by getting apps</em></ins></span> from the <span
class="removed"><del><strong>user's own
- computer, the TV reports what it is. The existence of a way to
- disable</strong></del></span> <span class="inserted"><ins><em>free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>surveillance,
even</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> if <span
class="removed"><del><strong>it were not hidden as it was in
- these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>an app contains
anti-features</a>.</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users</em></ins></span> are <span
class="removed"><del><strong>totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>HIV-positive,
then provides</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV will</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
-
- <p>Grindr should</em></ins></span> not <span
class="removed"><del><strong>work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>have so much information about its users.
- It could be designed so</em></ins></span> that <span
class="removed"><del><strong>TVs are</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each
- other but</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> to <span
class="removed"><del><strong>report what</strong></del></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>server's database.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying</strong></del></span>
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass app and dis-service
- spy</em></ins></span> on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>users even more
than users expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and
- <span class="removed"><del><strong>link them your IP
address</a></strong></del></span> <span class="inserted"><ins><em>after
going to a movie</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span>
- <p>Don't be tracked—pay cash!</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
- <li id="M201711240">
- <p>Tracking software in popular Android apps
+<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+ follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up to me</strong></del></span> <span class="inserted"><ins><em>physical
store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
+ uploads all phone numbers</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
book to developer's server.</p>
- <p><small>(Note that this article misuses the words
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.)</small></p>
</li>
<li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span class="inserted"><ins><em>sent them and
text messages and emails to snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ <p>Google did</em></ins></span> not <span
class="removed"><del><strong>just broadcasts</strong></del></span> <span
class="inserted"><ins><em>intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ <p>On</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps, and
+ therefore shares in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>responsibility
for the injustice</em></ins></span> of <span class="inserted"><ins><em>their
being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
-
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
+ cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in</strong></del></span> <span class="inserted"><ins><em>source code
for</em></ins></span> these <span class="removed"><del><strong>TVs, does not
legitimize</strong></del></span> <span class="inserted"><ins><em>apps, and
study</em></ins></span>
+ the <span class="removed"><del><strong>surveillance.</p>
+ </li>
+
+ <li><p>More</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
+ various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span>
+ <span class="inserted"><ins><em>prevent such snooping, except
when</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ enough</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public,</em></ins></span> so <span class="inserted"><ins><em>we can depend
on each other.</p>
+ Google to protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend</em></ins></span>
on
+ <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>each
other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="inserted"><ins><em>only hope that they don't.</p>
+ <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but having it enabled by
default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p></em></ins></span>
</li>
- <li id="M201705040">
- <p>A study found 234 Android apps that</em></ins></span> track <span
class="removed"><del><strong>you
- across devices.</p>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being
watched</strong></del></span>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to <span class="inserted"><ins><em>ultrasound from beacons placed in
stores or played by TV
- programs</a>.</p>
+ <span class="inserted"><ins><em><li id="M201705040">
+ <p>A study found 234 Android apps that track users</em></ins></span>
by
+ <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
+ social media participation, Tivo can now</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
+ to
+ <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>ultrasound
from beacons placed in stores or played</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
+ <li><p>Some web and</strong></del></span> TV <span
class="removed"><del><strong>advertisements play inaudible
sounds</strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>do lots
of surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other devices in
+ range so as to</strong></del></span> <span
class="inserted"><ins><em><a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.</p>
</li>
@@ -2476,8 +2494,9 @@
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
- are nearby. Once your Internet devices are paired with
+ on other devices in range so as to</em></ins></span> determine that they
+ are <span class="removed"><del><strong>nearby. Once your
+ Internet devices are paired</strong></del></span> <span
class="inserted"><ins><em>nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
@@ -2868,8 +2887,8 @@
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
- and <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
- turn <span class="inserted"><ins><em>it into a listening device</a>
for them.</p>
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China or the US
@@ -2948,17 +2967,15 @@
</li>
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>an Android
app <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
+ <li id="M201407090">
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
@@ -2979,46 +2996,37 @@
upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure you can
- disconnect its cellular antenna and its GPS antenna. If you want
+ <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
+ <span class="removed"><del><strong>correlate ads</strong></del></span>
+ <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
GPS navigation, get a separate navigator which runs free software
- and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
+ and works</em></ins></span> with <span class="removed"><del><strong>Web
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street
Map.</p>
</li>
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
- cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
+ <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>a junkyard the
driver's personal data goes with
+ when they go to a junkyard the driver's personal data goes with
them</a>.</p>
</li>
<li id="M201902011">
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>the
internal car network</a>. It is constantly
- connected</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of
data,
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
- key is removed, and users report</em></ins></span> that they <span
class="removed"><del><strong>are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can't disable it.</p>
+ key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
@@ -3634,7 +3642,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.361
retrieving revision 1.362
diff -u -b -r1.361 -r1.362
--- proprietary-surveillance.it.po 17 Oct 2020 08:05:10 -0000 1.361
+++ proprietary-surveillance.it.po 2 Nov 2020 15:03:00 -0000 1.362
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -527,6 +527,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a href=\"http://www.bbc.com/news/"
"technology-42309371\">includes a proprietary keyboard driver with a key "
"logger in it</a>."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary-surveillance.ja-diff.html 17 Oct 2020 08:05:10 -0000
1.219
+++ proprietary-surveillance.ja-diff.html 2 Nov 2020 15:03:00 -0000
1.220
@@ -275,6 +275,15 @@
<li><p>By</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -601,132 +610,137 @@
legitimate,</strong></del></span> <span class="inserted"><ins><em>Biden's
app has a less manipulative overall
approach,</em></ins></span> but <span class="removed"><del><strong>is that
valid? Software developers have no right to
analyze what users are doing or how. “Analytics”
tools</strong></del></span> that <span class="removed"><del><strong>snoop are
- just as wrong as any other snooping.</p>
+ just as wrong</strong></del></span> <span class="inserted"><ins><em>does not
tell us whether it has functionalities we
+ consider malicious, such</em></ins></span> as <span
class="removed"><del><strong>any other snooping.</p>
</li>
- <li><p>Gratis Android apps (but</strong></del></span> <span
class="inserted"><ins><em>does</em></ins></span> not <span
class="removed"><del><strong><a href="/philosophy/free-sw.html">free
software</a>)
- connect to 100
+ <li><p>Gratis Android apps (but</strong></del></span> <span
class="inserted"><ins><em>sending data the user has</em></ins></span> not <span
class="removed"><del><strong><a href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span> <span class="inserted"><ins><em>explicitly
+ asked</em></ins></span> to <span class="removed"><del><strong>100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>tell us whether
it has functionalities we
- consider malicious, such as sending data</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>user has not explicitly
- asked to send.</p></em></ins></span>
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>send.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola</strong></del></span>
<span class="inserted"><ins><em><li id="M201601110">
<p>The natural extension of monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices
when</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure</em></ins></span> they <span
class="removed"><del><strong>are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>can't “fool”
- the monitoring</a>.</p>
- </li>
-
- <li id="M201510050">
- <p>According</em></ins></span> to <span
class="inserted"><ins><em>Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
- smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
- retrieve geo-location</em></ins></span> data <span
class="inserted"><ins><em>from the GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>disguise itself
- from investigation.</p></em></ins></span>
+ people through “their”</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>make sure they can't “fool”
+ the monitoring</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
- <span class="inserted"><ins><em><li id="M201311120">
- <p><a
-
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201510050">
+ <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ smartphones</a> by sending</em></ins></span> hidden <span
class="removed"><del><strong>general surveillance package such as Carrier
IQ.</a></p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>the system.</p></strong></del></span> <span
class="inserted"><ins><em>remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p></em></ins></span>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>text messages which enable
+ them</em></ins></span> to <span class="removed"><del><strong>any
file</strong></del></span> <span class="inserted"><ins><em>turn the
phones</em></ins></span> on <span class="inserted"><ins><em>and off, listen
to</em></ins></span> the <span class="removed"><del><strong>system.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareIniThings">iThings</h4></em></ins></span>
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>disguise itself
+ from investigation.</p>
+ </li>
+
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>iPhones</strong></del></span>
+<ul>
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></em></ins></span>
+ lots of <span class="removed"><del><strong>personal data to Apple's
servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>bugs in the phones' radio
software</a>.</p></em></ins></span>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202009183">
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning on the device's
- camera.</p>
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307000">
+ <p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into
it</a>;</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p>
</li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
- <li id="M202004200">
- <p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice</em></ins></span> of <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>surreptitiously activating the Siri
software</em></ins></span> to <span class="removed"><del><strong>Apple's
servers</a>. Big Brother can
- get them from there.</p>
+<ul class="blurbs">
+ <li id="M202009183">
+ <p>Facebook <a
+
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a> users by surreptitously turning
on</em></ins></span> the <span class="removed"><del><strong>server records
these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>device's
+ camera.</p></em></ins></span>
</li>
- <li><p>The iMessage app on iThings</strong></del></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
+ <span class="removed"><del><strong><li><p>Users cannot make
an</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202004200">
+ <p>Apple whistleblower Thomas Le Bonniec reports
that</em></ins></span> Apple <span
class="removed"><del><strong>ID</strong></del></span>
+ <span class="inserted"><ins><em>made a practice of surreptitiously
activating the Siri software to</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was to listen to these recordings, in</em></ins></span> a
<span class="removed"><del><strong>server every phone
number</strong></del></span> <span class="inserted"><ins><em>group that made
+ <p>His job was</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving</strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in</em></ins></span> a
<span class="removed"><del><strong>valid email address</strong></del></span>
<span class="inserted"><ins><em>group that made
transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable way to prevent this is, for the
program</em></ins></span> that
- <span class="inserted"><ins><em>controls access to the microphone to
decide when</em></ins></span> the user <span class="removed"><del><strong>types
into it</a>;</strong></del></span> <span class="inserted"><ins><em>has
- “activated” any service, to be free software,
and</em></ins></span> the <span class="removed"><del><strong>server records
these numbers for at least 30
- days.</p>
+ <p>The only reliable way to prevent this is, for the program that
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free
software,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> the <span
class="removed"><del><strong>code</strong></del></span>
+ <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
+ sure</em></ins></span> Apple
+ <span class="removed"><del><strong>sends</strong></del></span> <span
class="inserted"><ins><em>can't listen</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
</li>
- <li><p>Users cannot</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could</em></ins></span> make <span
class="removed"><del><strong>an</strong></del></span>
- <span class="inserted"><ins><em>sure</em></ins></span> Apple <span
class="removed"><del><strong>ID</strong></del></span> <span
class="inserted"><ins><em>can't listen to them.</p>
- </li>
-
- <li id="M201910131">
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
-
- <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>check URLs that possibly correspond to
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to</em></ins></span> the
<span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list</em></ins></span> most <span
class="removed"><del><strong>popular iOS apps
+ with the Chinese government, its Safe Browsing black
list</em></ins></span> most <span class="removed"><del><strong>popular iOS apps
<a href="http://jots.pub/a/2015103001/index.php">share personal,
behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>certainly
contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
@@ -747,21 +761,16 @@
<span class="inserted"><ins><em>privacy, iPhone apps contain trackers
that</em></ins></span> are <span class="removed"><del><strong>automatically
updated everywhere. [...]
</p></blockquote>
- <p>(From</strong></del></span> <span class="inserted"><ins><em>busy
at night</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.)</strong></del></span>
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature
is</strong></del></span> <span class="inserted"><ins><em>busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify,</em></ins></span> The <span
class="removed"><del><strong>iCloud feature is
- <a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>Washington Post, The Weather
- Channel (owned</em></ins></span> by <span
class="inserted"><ins><em>IBM),</em></ins></span> the
- <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span class="inserted"><ins><em>these
send personally identifying data such as phone
+ trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
is collected by the company, there is no telling what it will be
@@ -816,11 +825,11 @@
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the
startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There</em></ins></span> is a way to
+ <p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
iCloud</a>, but it's active by default so it still counts as a
surveillance functionality.</p>
@@ -831,14 +840,17 @@
security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware in iThings:</strong></del></span>
+ <li><p>Spyware in iThings:
+ the</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>iThing is,
+ and get</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
@@ -851,19 +863,19 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <a
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ for no possible purpose other than surveillance</a>. Here is the
<a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"</em></ins></span>
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ get</em></ins></span> other info too.</p>
</li>
- <span class="removed"><del><strong><li><p>There
is</strong></del></span>
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
<span class="inserted"><ins><em><li id="M201312300">
<p><a
@@ -880,7 +892,7 @@
</li>
<li id="M201210170">
- <p>There is</em></ins></span> also a feature for web sites to track
users, which is <a
+ <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
@@ -933,39 +945,34 @@
by sending hidden text messages which enable them to
turn</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
many actions</em></ins></span> the <span
class="removed"><del><strong>phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>a song. They
send device identifying
+ on</strong></del></span> <span class="inserted"><ins><em>user
takes</a>: starting an app, looking at a folder,
+ visiting a website, listening to a song. They send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>web
- browsing history,</strong></del></span>
- <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span>
+ <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user, and <a
href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
+ users identify themselves</em></ins></span> to <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>same wrongs when
the culprits are not Chinese,
+ <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
- <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em><a
+ <p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p></em></ins></span>
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811230">
+ <li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
+ it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
</li>
<li id="M201711210">
@@ -986,17 +993,20 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung</em></ins></span> phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much</em></ins></span>
data that their
+ that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
of some
@@ -1065,12 +1075,12 @@
<span class="inserted"><ins><em><li id="M201302150">
<p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span>
+ movements before and after</strong></del></span>
<span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>personal details of users that install the
app</a>.</p>
+ the <span class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>personal
details of users that install</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
<p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a
protection against massive
surveillance.</p>
@@ -1143,7 +1153,10 @@
</li>
<span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM</strong></del></span>
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1161,10 +1174,7 @@
<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
+ <p>Some Avast and AVG extensions
for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>Google
@@ -1224,17 +1234,17 @@
surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging app seems</em></ins></span> to <span
class="inserted"><ins><em>be a <a
-
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>government of</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
- Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>that is a good
- reason to use free software instead.</p>
+ <p>The ToToc messaging app seems to be a</em></ins></span> <a
<span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that</em></ins></span> is
<span class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>a good
+ reason</em></ins></span> to <span class="inserted"><ins><em>use free
software instead.</p>
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>word “free”</em></ins></span> in
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS</strong></del></span> <span class="inserted"><ins><em>word
“free”</em></ins></span> in
the
<span class="removed"><del><strong>phone.</p>
@@ -1301,20 +1311,28 @@
functionalities.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
<span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>the NSA takes
advantage to spy through it too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>Maya</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <p>Some nonfree period-tracking apps including MIA Fem and
Maya</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
+ </li>
+
+ <li id="M201909060">
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage to spy through it
too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to
Facebook</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -1325,14 +1343,7 @@
<ul>
<li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909060">
- <p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There is a
- proprietary program</em></ins></span> for <span
class="removed"><del><strong>collecting lots</strong></del></span> <span
class="inserted"><ins><em>adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list</em></ins></span> of <span
class="removed"><del><strong>personal information about
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or
more</em></ins></span> people <span
class="removed"><del><strong>use</strong></del></span>
+ being sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>list</em></ins></span> of <span
class="removed"><del><strong>personal information about
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or
more</em></ins></span> people <span
class="removed"><del><strong>use</strong></del></span>
<span class="inserted"><ins><em>who have installed</em></ins></span>
it</a>.</p>
<span class="removed"><del><strong><p>The company's statement
that it anonymizes the data may</strong></del></span>
@@ -1406,53 +1417,146 @@
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>insurance
companies</a>. Even though the
+<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even though the
data is “anonymized and aggregated,” it can easily be
traced back to the woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
+ and freedom to</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>do so. A
free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p>
+ spying</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>you
is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
+ a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>new
one</em></ins></span> is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>being
developed</a>.</p>
</li>
<li id="M201904130">
<p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the phone has</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>location data to
Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
+ <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>Parliament
+ this way, because they</strong></del></span> <span
class="inserted"><ins><em><a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ the data, or</em></ins></span> pass it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access to
+ the network but no direct access to the data. This
results</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>massive
+ surveillance on which the user has absolutely no
control.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ for invasive advertising or discriminating against
people</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner”
switches</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>buried in
+ lengthy terms of service that are difficult</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
- <li id="M201902230">
+<ul>
+ <li><p>E-books</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
@@ -1460,7 +1564,7 @@
way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
- <p>It shows that no one can trust a nonfree program, not even the
+ <p>It shows that no one</em></ins></span> can <span
class="removed"><del><strong>contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em>trust a nonfree program, not even the
developers of other nonfree programs.</p>
</li>
@@ -1470,23 +1574,28 @@
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ Advertising ID</a> to other companies,</em></ins></span> and <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link</em></ins></span> this <span
class="removed"><del><strong>code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is in apparent violation of
+ <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
+ that</em></ins></span> the
+ <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
@@ -2276,17 +2385,15 @@
Crackers found a way to break security on a “smart”
TV</a>
and use its camera to watch the people who are watching TV.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
@@ -2329,22 +2436,18 @@
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
into one.</p>
@@ -2359,8 +2462,7 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>its users through
the proprietary control app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
@@ -2371,21 +2473,18 @@
products, rather than free software which users could have checked
and changed.</p>
- <p>The company</em></ins></span> that <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
people</em></ins></span>
- used <span class="removed"><del><strong>did not affect
-GNU/Linux; also, a “clean” Windows install is
not</strong></del></span> <span
class="inserted"><ins><em>it</a>.</p>
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't</em></ins></span> really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>matter. If it had sold the data to a data
+ true, but it doesn't really matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of C$4m</a> to its
customers.</p>
</li>
@@ -2410,79 +2509,53 @@
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
+ crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ going to spy on children and adults</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
- <li><p>Spyware</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202009270">
<p>Many employers are using nonfree
software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>effect a malicious
+ whether you are “active,” that is in effect a malicious
surveillance feature.</p>
</li>
<li id="M202008030">
- <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
+ update to its speaker devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
@@ -2514,82 +2587,43 @@
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>snooping.</p></em></ins></span>
+ manufacturers for snooping.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
- when <span class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
+ <li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
+ way to see or control what it records or sends.</p>
- <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
+ <p>Rather than trying to better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google
service.</p></em></ins></span>
+ get commands that the user wants to send to some Google service.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905061">
+ <li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="inserted"><ins><em>sends
+ recordings made without a legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>,
where</em></ins></span> they <span class="removed"><del><strong>report even
which page</strong></del></span> <span class="inserted"><ins><em>can be
accessed by
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>user
reads</strong></del></span> <span class="inserted"><ins><em>collected
information doesn't cancel the wrong of
+ deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users'
life</em></ins></span>
- at <span class="removed"><del><strong>what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>home, not only in the present, but in the past (and,
who knows,
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
in the future too?)</p></em></ins></span>
</li>
@@ -3450,7 +3484,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/17 08:05:10 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.343
retrieving revision 1.344
diff -u -b -r1.343 -r1.344
--- proprietary-surveillance.ja.po 17 Oct 2020 08:05:10 -0000 1.343
+++ proprietary-surveillance.ja.po 2 Nov 2020 15:03:00 -0000 1.344
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -423,6 +423,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a href=\"http://www.bbc.com/news/"
"technology-42309371\">includes a proprietary keyboard driver with a key "
"logger in it</a>."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary-surveillance.pot 17 Oct 2020 08:05:10 -0000 1.282
+++ proprietary-surveillance.pot 2 Nov 2020 15:03:00 -0000 1.283
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -321,6 +321,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a "
+"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\">tricking
"
+"users to create an account on their network</a> to be able to install and "
+"use the Windows operating system, which is malware. The account can be used "
+"for surveillance and/or violating people's rights in many ways, such as "
+"turning their purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a "
"href=\"http://www.bbc.com/news/technology-42309371\">includes a proprietary "
"keyboard driver with a key logger in it</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.639
retrieving revision 1.640
diff -u -b -r1.639 -r1.640
--- proprietary-surveillance.ru.po 19 Oct 2020 10:00:05 -0000 1.639
+++ proprietary-surveillance.ru.po 2 Nov 2020 15:03:00 -0000 1.640
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-17 07:56+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -376,6 +377,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"HP's proprietary operating system <a href=\"http://www.bbc.com/news/"
"technology-42309371\">includes a proprietary keyboard driver with a key "
"logger in it</a>."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.de-diff.html 2 Nov 2020 11:01:44 -0000 1.185
+++ proprietary.de-diff.html 2 Nov 2020 15:03:00 -0000 1.186
@@ -212,6 +212,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -226,9 +235,7 @@
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
-communications between parent and child and spoof messages to and from
-the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -250,15 +257,6 @@
taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
-
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -322,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary.de.po 2 Nov 2020 11:01:44 -0000 1.225
+++ proprietary.de.po 2 Nov 2020 15:03:00 -0000 1.226
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -523,16 +533,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary.es.po 2 Nov 2020 11:01:44 -0000 1.332
+++ proprietary.es.po 2 Nov 2020 15:03:00 -0000 1.333
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -323,6 +323,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -394,22 +404,6 @@
"beneficiarse de las «funcionalidades avanzadas» del aparato a menos que "
"paguen una tarifa mensual."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Muchos empresarios están utilizando software privativo, incluido software de
"
-"videoconferencia, para <a href=\"https://www.theguardian.com/world/2020/"
-"sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
-"surveillance\">vigilar y monitorizar el trabajo de los empleados en casa</"
-"a>. Si el programa informa de si la persona está «activa», esa es en
efecto "
-"una caracterÃstica maliciosa de vigilancia."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,3 +483,18 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are “active,” that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "Muchos empresarios están utilizando software privativo, incluido software
"
+#~ "de videoconferencia, para <a href=\"https://www.theguardian.com/"
+#~ "world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-"
+#~ "up-remote-surveillance\">vigilar y monitorizar el trabajo de los "
+#~ "empleados en casa</a>. Si el programa informa de si la persona está "
+#~ "«activa», esa es en efecto una caracterÃstica maliciosa de vigilancia."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.374
retrieving revision 1.375
diff -u -b -r1.374 -r1.375
--- proprietary.fr.po 2 Nov 2020 11:01:44 -0000 1.374
+++ proprietary.fr.po 2 Nov 2020 15:03:00 -0000 1.375
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-10-29 09:49+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -319,6 +319,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -391,22 +401,6 @@
"ancrage en un abonnement</a> qui interdit aux utilisateurs de profiter des "
"« fonctionnalités avancées » à moins de payer une cotisation
mensuelle."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"De nombreux employeurs utilisent du logiciel non libre, de vidéo-conférence
"
-"en particulier, pour <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\">surveiller et vérifier le télétravail de leurs collaborateurs</a>. "
-"Lorsqu'un programme rapporte si on est « actif » ou non, il contient en
fait "
-"une fonctionnalité malveillante."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +475,21 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are “active,” that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "De nombreux employeurs utilisent du logiciel non libre, de vidéo-"
+#~ "conférence en particulier, pour <a href=\"https://www.theguardian.com/"
+#~ "world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-"
+#~ "up-remote-surveillance\">surveiller et vérifier le télétravail de leurs
"
+#~ "collaborateurs</a>. Lorsqu'un programme rapporte si on est « actif »
ou "
+#~ "non, il contient en fait une fonctionnalité malveillante."
+
+#~ msgid ""
#~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/"
#~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
#~ "Instagram</a> users by surreptitously turning on the device's camera."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary.it-diff.html 2 Nov 2020 11:01:44 -0000 1.197
+++ proprietary.it-diff.html 2 Nov 2020 15:03:00 -0000 1.198
@@ -58,9 +58,8 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -225,9 +234,7 @@
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
-communications between parent and child and spoof messages to and from
-the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -249,15 +256,6 @@
taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
-
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -321,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary.it.po 2 Nov 2020 11:01:44 -0000 1.234
+++ proprietary.it.po 2 Nov 2020 15:03:00 -0000 1.235
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -516,16 +526,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.ja-diff.html 2 Nov 2020 11:01:44 -0000 1.202
+++ proprietary.ja-diff.html 2 Nov 2020 15:03:00 -0000 1.203
@@ -55,8 +55,8 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -155,11 +155,11 @@
<td>
<ul>
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
- <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -210,6 +210,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -224,9 +233,7 @@
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
-communications between parent and child and spoof messages to and from
-the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -248,15 +255,6 @@
taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
-
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -320,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.ja.po 2 Nov 2020 11:01:44 -0000 1.218
+++ proprietary.ja.po 2 Nov 2020 15:03:00 -0000 1.219
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -374,16 +384,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.nl-diff.html 2 Nov 2020 11:01:44 -0000 1.198
+++ proprietary.nl-diff.html 2 Nov 2020 15:03:00 -0000 1.199
@@ -211,6 +211,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -225,9 +234,7 @@
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
-communications between parent and child and spoof messages to and from
-the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -249,15 +256,6 @@
taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
-
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -321,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.nl.po 2 Nov 2020 11:01:44 -0000 1.208
+++ proprietary.nl.po 2 Nov 2020 15:03:00 -0000 1.209
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -419,16 +429,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.215
retrieving revision 1.216
diff -u -b -r1.215 -r1.216
--- proprietary.pl-diff.html 2 Nov 2020 11:01:44 -0000 1.215
+++ proprietary.pl-diff.html 2 Nov 2020 15:03:00 -0000 1.216
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -155,17 +155,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -210,6 +210,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -224,9 +233,7 @@
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
-communications between parent and child and spoof messages to and from
-the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -248,15 +255,6 @@
taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
-
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -320,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.pl.po 2 Nov 2020 11:01:44 -0000 1.201
+++ proprietary.pl.po 2 Nov 2020 15:03:00 -0000 1.202
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -600,16 +610,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary.pot 2 Nov 2020 11:01:44 -0000 1.198
+++ proprietary.pot 2 Nov 2020 15:03:00 -0000 1.199
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a "
+"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\">tricking
"
+"users to create an account on their network</a> to be able to install and "
+"use the Windows operating system, which is malware. The account can be used "
+"for surveillance and/or violating people's rights in many ways, such as "
+"turning their purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a "
"href=\"https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world\">coerces
"
"players to spend money by overwhelming the game play with loot boxes</a>."
@@ -308,16 +318,6 @@
"pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a "
-"href=\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance\">
"
-"surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary.pt-br-diff.html 2 Nov 2020 11:01:44 -0000 1.7
+++ proprietary.pt-br-diff.html 2 Nov 2020 15:03:00 -0000 1.8
@@ -194,83 +194,82 @@
</li>
<li id="M202006300">
- <p>“Bossware” is malware that
bosses</strong></del></span> <span class="inserted"><ins><em>id="M202010220">
- <p>The addictive Genshin Impact relentlessly</em></ins></span> <a
+ <p>“Bossware”</strong></del></span> <span
class="inserted"><ins><em>id="M201912160">
+ <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>malware that bosses</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
coerce workers into installing in their own computers</a>, so the
- bosses can spy on them.</p>
+ bosses can spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account</em></ins></span> on <span
class="removed"><del><strong>them.</p>
+
+ <p>This shows why requiring</strong></del></span> <span
class="inserted"><ins><em>their network</a> to be able to install
+ and use</em></ins></span> the <span class="removed"><del><strong>user's
“consent”</strong></del></span> <span
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is
<span class="removed"><del><strong>not
+ an adequate basis for protecting digital privacy.</strong></del></span>
<span class="inserted"><ins><em>malware.</em></ins></span> The <span
class="removed"><del><strong>boss</strong></del></span> <span
class="inserted"><ins><em>account</em></ins></span> can <span
class="removed"><del><strong>coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contagious disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should</strong></del></span>
+ be <span class="removed"><del><strong>prosecuted</strong></del></span>
<span class="inserted"><ins><em>used</em></ins></span> for <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance and/or violating people's rights in many
ways,
+ such as turning their purchased software to a subscription
product.</p></em></ins></span>
+ </li>
- <p>This shows why requiring the user's “consent” is not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable
exposure</strong></del></span>
+ <li <span class="removed"><del><strong>id="M201504210">
+ <p>Runescape is a popular online game with some <a
+
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/"></strong></del></span>
<span class="inserted"><ins><em>id="M202010220">
+ <p>The</em></ins></span> addictive <span
class="removed"><del><strong>features</a> derived
from</strong></del></span> <span class="inserted"><ins><em>Genshin Impact
relentlessly</em></ins></span> <a
+ <span
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness">
+ behavioral manipulation techniques</a>. Certain
+ repetitive aspects of the game, like <a
+ href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
+ grinding</a>, can be minimised by becoming a paying member, and can
+ thus encourage children and impressionable people</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players</em></ins></span> to <span class="removed"><del><strong>contagious
disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for
it.</p></strong></del></span> <span class="inserted"><ins><em>spend money
by overwhelming the game play with loot
+ players</em></ins></span> to spend money <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>by overwhelming</em></ins></span> the <span
class="removed"><del><strong>game.</p></strong></del></span> <span
class="inserted"><ins><em>game play with loot
boxes</a>.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="M201504210">
- <p>Runescape is a popular online game</strong></del></span> <span
class="inserted"><ins><em>id="M202009100">
- <p>Internet-enabled watches</em></ins></span> with <span
class="removed"><del><strong>some <a
-
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
- addictive features</a> derived from <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
- behavioral manipulation techniques</a>. Certain
- repetitive aspects</strong></del></span> <span
class="inserted"><ins><em>proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot</em></ins></span> of <span
class="removed"><del><strong>the game, like</strong></del></span> <span
class="inserted"><ins><em>security flaws. They</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
- grinding</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ <li <span class="removed"><del><strong>id="M202006260">
+ <p>Most apps</strong></del></span> <span
class="inserted"><ins><em>id="M202009100">
+ <p>Internet-enabled watches with proprietary
software</em></ins></span>
+ are malware, <span class="removed"><del><strong>but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has</strong></del></span> <span
class="inserted"><ins><em>violating people (specially children's)
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>less manipulative overall
+ approach, but</strong></del></span> <span class="inserted"><ins><em>lot of
security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people</em></ins></span> can
<span class="removed"><del><strong>be minimised by becoming a paying
member,</strong></del></span> <span class="inserted"><ins><em>intercept
-communications between parent</em></ins></span> and <span
class="removed"><del><strong>can
- thus encourage children</strong></del></span> <span
class="inserted"><ins><em>child</em></ins></span> and <span
class="removed"><del><strong>impressionable people</strong></del></span> <span
class="inserted"><ins><em>spoof messages</em></ins></span> to <span
class="removed"><del><strong>spend money on</strong></del></span> <span
class="inserted"><ins><em>and from
-the watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>game.</p></strong></del></span>
<span class="inserted"><ins><em>word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p></em></ins></span>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
+
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>does not tell us whether it has functionalities we
+ consider malicious, such as sending data</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>user has not explicitly
+ asked</strong></del></span> <span class="inserted"><ins><em>word
“<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”</em></ins></span>
+ to <span
class="removed"><del><strong>send.</p></strong></del></span> <span
class="inserted"><ins><em>mean
“crackers.”)</small></p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="M202006260">
- <p>Most apps are malware, but
- Trump's campaign app, like Modi's campaign app, is</strong></del></span>
<span class="inserted"><ins><em>id="M202003110">
+ <li <span class="removed"><del><strong>id="M202006250">
+ <p>TV manufacturers are able to</strong></del></span> <span
class="inserted"><ins><em>id="M202003110">
<p>Roblox (among many other games)
created anti-features which sucker children into</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on users as well
- as snooping on them itself</a>.</p></strong></del></span>
+ <span
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>.
This</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge">
utilizing third-party payment services without
authorization.</a></p>
</li>
- <li id="M202007270"></em></ins></span>
- <p>The <span class="removed"><del><strong>article says that Biden's
app has</strong></del></span> <span class="inserted"><ins><em>Mellow sous-vide
cooker is
- tethered to</em></ins></span> a <span class="removed"><del><strong>less
manipulative overall
- approach, but that does not tell us whether it has functionalities we
- consider malicious, such as sending data</strong></del></span> <span
class="inserted"><ins><em>server. The company suddenly <a
+ <li id="M202007270">
+ <p>The Mellow sous-vide cooker</em></ins></span> is <span
class="removed"><del><strong>illegal due</strong></del></span>
+ <span class="inserted"><ins><em>tethered</em></ins></span> to <span
class="inserted"><ins><em>a server. The company suddenly <a
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
turned this tethering into a subscription</a>, forbidding users from
- taking advantage of</em></ins></span> the <span
class="removed"><del><strong>user has not explicitly
- asked to send.</p></strong></del></span> <span
class="inserted"><ins><em>“advanced features” of the cooker
+ taking advantage of</em></ins></span> the <span
class="removed"><del><strong>Video Privacy Protection Act</strong></del></span>
<span class="inserted"><ins><em>“advanced
features”</em></ins></span> of <span class="removed"><del><strong>1988,
but they're circumventing
+ it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>the cooker
unless they pay a monthly fee.</p></em></ins></span>
</li>
-
- <li <span class="removed"><del><strong>id="M202006250">
- <p>TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>id="M202009270">
- <p>Many employers</em></ins></span> are <span
class="removed"><del><strong>able</strong></del></span> <span
class="inserted"><ins><em>using nonfree
- software, including videoconference software,</em></ins></span> to <a
- <span
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If</em></ins></span>
the <span class="removed"><del><strong>user is watching</a>.
This</strong></del></span> <span class="inserted"><ins><em>program reports
- whether you are “active,” that</em></ins></span> is <span
class="removed"><del><strong>illegal due to
- the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>in effect a malicious
- surveillance feature.</p></em></ins></span>
- </li>
</ul>
</div>
@@ -333,7 +332,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- proprietary.pt-br.po 2 Nov 2020 11:01:44 -0000 1.333
+++ proprietary.pt-br.po 2 Nov 2020 15:03:00 -0000 1.334
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -318,6 +318,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -370,16 +380,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.410
retrieving revision 1.411
diff -u -b -r1.410 -r1.411
--- proprietary.ru.po 2 Nov 2020 12:32:15 -0000 1.410
+++ proprietary.ru.po 2 Nov 2020 15:03:00 -0000 1.411
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-02 14:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +319,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -389,22 +400,6 @@
"запÑеÑив полÑзоваÑелÑм пÑименÑÑÑ
“пÑогÑеÑÑивнÑе ÑÑнкÑии” "
"обоÑÑдованиÑ, еÑли Ñе не вноÑÑÑ
ежемеÑÑÑнÑÑ Ð¿Ð»Ð°ÑÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Ðногие ÑадоÑодаÑели полÑзÑÑÑÑÑ
неÑвободнÑми пÑогÑаммами, в Ñом ÑиÑле "
-"пÑогÑаммами видеоконÑеÑенÑий, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.theguardian.com/"
-"world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-"
-"remote-surveillance\"> ÑледиÑÑ Ð¸ наблÑдаÑÑ Ð·Ð°
ÑоÑÑÑдниками, ÑабоÑаÑÑими "
-"дома</a>. ÐÑли пÑогÑамма ÑообÑаеÑ, ÑÑо вÑ
“акÑивнє, ÑÑо "
-"ÑакÑиÑеÑки пÑедÑÑавлÑÐµÑ Ð²ÑедоноÑнÑÑ
ÑÑнкÑÐ¸Ñ Ñлежки."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +476,21 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are “active,” that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "Ðногие ÑадоÑодаÑели полÑзÑÑÑÑÑ
неÑвободнÑми пÑогÑаммами, в Ñом ÑиÑле "
+#~ "пÑогÑаммами видеоконÑеÑенÑий, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.theguardian.com/"
+#~ "world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-"
+#~ "up-remote-surveillance\"> ÑледиÑÑ Ð¸ наблÑдаÑÑ Ð·Ð°
ÑоÑÑÑдниками, "
+#~ "ÑабоÑаÑÑими дома</a>. ÐÑли пÑогÑамма
ÑообÑаеÑ, ÑÑо Ð²Ñ “"
+#~ "акÑивнє, ÑÑо ÑакÑиÑеÑки
пÑедÑÑавлÑÐµÑ Ð²ÑедоноÑнÑÑ ÑÑнкÑÐ¸Ñ Ñлежки."
+
+#~ msgid ""
#~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/"
#~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
#~ "Instagram</a> users by surreptitously turning on the device's camera."
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.tr.po 2 Nov 2020 11:01:44 -0000 1.67
+++ proprietary.tr.po 2 Nov 2020 15:03:01 -0000 1.68
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-10-29 17:46+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -314,6 +314,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -384,22 +394,6 @@
"aylık bir ücret ödemedikleri takdirde kullanıcıların piÅiricinin
“"
"geliÅmiŠözelliklerinden” yararlanmalarını yasaklıyor."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"ÃoÄu çalıÅan özgür olmayan yazılım kullanıyor, bunların
içerisinde <a href="
-"\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-"
-"feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde çalıÅan "
-"personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var.
EÄer "
-"program “etkin” olup olmadıÄınızı bildiriyorsa, bu aslında "
-"kötücül bir gözetim özelliÄidir."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -481,6 +475,21 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are “active,” that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "ÃoÄu çalıÅan özgür olmayan yazılım kullanıyor, bunların
içerisinde <a "
+#~ "href=\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-"
+#~ "staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde
çalıÅan "
+#~ "personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var. "
+#~ "EÄer program “etkin” olup olmadıÄınızı bildiriyorsa, bu "
+#~ "aslında kötücül bir gözetim özelliÄidir."
+
+#~ msgid ""
#~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/"
#~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
#~ "Instagram</a> users by surreptitously turning on the device's camera."
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary.zh-cn.po 2 Nov 2020 11:01:44 -0000 1.73
+++ proprietary.zh-cn.po 2 Nov 2020 15:03:01 -0000 1.74
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-10-19 11:31+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -296,6 +296,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -356,20 +366,6 @@
"surprise-27630842/\">æç»å®æ¹ä¸ºæ³¨å</a>ï¼å¦æç¨æ·ä¸ä»æç§è´¹ï¼é£ä¹ä»ä»¬å°±ä¸è½ä½¿"
"ç¨çµé¥ç
²çæäº “é«çº§åè½”ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"许å¤é主使ç¨éèªç±è½¯ä»¶ï¼å
æ¬è§é¢ä¼è®®è½¯ä»¶ï¼æ¥ <a
href=\"https://www."
-"theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-"
-"bosses-ramp-up-remote-surveillance\">çè§åçæ§å¨å®¶åå
¬çåå·¥</a>ãå¦æ该ç¨åº"
-"æ±æ¥ä½ æ¯å¦ “å¨æ´»è·ï¼å·¥ä½ï¼ï¼”é£ä¹å®å®é
ä¸å°±æ¯å¨çè§ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -454,6 +450,19 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Many employers are using nonfree software, including videoconference "
+#~ "software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+#~ "shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-"
+#~ "surveillance\"> surveil and monitor staff working at home</a>. If the "
+#~ "program reports whether you are “active,” that is in effect a "
+#~ "malicious surveillance feature."
+#~ msgstr ""
+#~ "许å¤é主使ç¨éèªç±è½¯ä»¶ï¼å
æ¬è§é¢ä¼è®®è½¯ä»¶ï¼æ¥ <a
href=\"https://www."
+#~ "theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-"
+#~ "as-bosses-ramp-up-remote-surveillance\">çè§åçæ§å¨å®¶åå
¬çåå·¥</a>ãå¦æ"
+#~ "该ç¨åºæ±æ¥ä½ æ¯å¦
“å¨æ´»è·ï¼å·¥ä½ï¼ï¼”é£ä¹å®å®é
ä¸å°±æ¯å¨çè§ã"
+
+#~ msgid ""
#~ "Facebook <a href=\"https://www.dailymail.co.uk/news/article-8747541/"
#~ "Facebook-accused-watching-Instagram-users-mobile-cameras.html\">snoops on "
#~ "Instagram</a> users by surreptitously turning on the device's camera."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary.zh-tw-diff.html 2 Nov 2020 11:01:44 -0000 1.178
+++ proprietary.zh-tw-diff.html 2 Nov 2020 15:03:01 -0000 1.179
@@ -212,6 +212,15 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to be able to install
+ and use the Windows operating system, which is malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
<li id="M202010220">
<p>The addictive Genshin Impact relentlessly <a
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
@@ -226,9 +235,7 @@
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
-communications between parent and child and spoof messages to and from
-the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
@@ -250,15 +257,6 @@
taking advantage of the “advanced features” of the cooker
unless they pay a monthly fee.</p>
</li>
-
- <li id="M202009270">
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -322,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/02 11:01:44 $
+$Date: 2020/11/02 15:03:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.zh-tw.po 2 Nov 2020 11:01:44 -0000 1.188
+++ proprietary.zh-tw.po 2 Nov 2020 15:03:01 -0000 1.189
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-02 10:55+0000\n"
+"POT-Creation-Date: 2020-11-02 14:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
"\">coerces players to spend money by overwhelming the game play with loot "
@@ -489,16 +499,6 @@
"advanced features” of the cooker unless they pay a monthly fee."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- pt-br.po 2 Nov 2020 11:01:44 -0000 1.287
+++ pt-br.po 2 Nov 2020 15:03:01 -0000 1.288
@@ -4974,6 +4974,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -8810,16 +8820,6 @@
"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
"sentido de âgrátisâ.</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -9591,6 +9591,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.490
retrieving revision 1.491
diff -u -b -r1.490 -r1.491
--- ru.po 2 Nov 2020 11:59:52 -0000 1.490
+++ ru.po 2 Nov 2020 15:03:01 -0000 1.491
@@ -6125,6 +6125,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -10679,22 +10689,6 @@
"words-to-avoid.html#Hacker\">Ñ
акеÑÑ</a>” невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
"обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"Ðногие ÑадоÑодаÑели полÑзÑÑÑÑÑ
неÑвободнÑми пÑогÑаммами, в Ñом ÑиÑле "
-"пÑогÑаммами видеоконÑеÑенÑий, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.theguardian.com/"
-"world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-"
-"remote-surveillance\"> ÑледиÑÑ Ð¸ наблÑдаÑÑ Ð·Ð°
ÑоÑÑÑдниками, ÑабоÑаÑÑими "
-"дома</a>. ÐÑли пÑогÑамма ÑообÑаеÑ, ÑÑо вÑ
“акÑивнє, ÑÑо "
-"ÑакÑиÑеÑки пÑедÑÑавлÑÐµÑ Ð²ÑедоноÑнÑÑ
ÑÑнкÑÐ¸Ñ Ñлежки."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11588,6 +11582,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"Ðногие ÑадоÑодаÑели полÑзÑÑÑÑÑ
неÑвободнÑми пÑогÑаммами, в Ñом ÑиÑле "
+"пÑогÑаммами видеоконÑеÑенÑий, ÑÑÐ¾Ð±Ñ <a
href=\"https://www.theguardian.com/"
+"world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-"
+"remote-surveillance\"> ÑледиÑÑ Ð¸ наблÑдаÑÑ Ð·Ð°
ÑоÑÑÑдниками, ÑабоÑаÑÑими "
+"дома</a>. ÐÑли пÑогÑамма ÑообÑаеÑ, ÑÑо вÑ
“акÑивнє, ÑÑо "
+"ÑакÑиÑеÑки пÑедÑÑавлÑÐµÑ Ð²ÑедоноÑнÑÑ
ÑÑнкÑÐ¸Ñ Ñлежки."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- tr.po 2 Nov 2020 11:01:45 -0000 1.67
+++ tr.po 2 Nov 2020 15:03:01 -0000 1.68
@@ -4393,6 +4393,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7804,22 +7814,6 @@
"\">üstât (hacker)</a>” kelimesini “güvenlik kırıcı” "
"anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"ÃoÄu çalıÅan özgür olmayan yazılım kullanıyor, bunların
içerisinde <a href="
-"\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-"
-"feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde çalıÅan "
-"personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var.
EÄer "
-"program “etkin” olup olmadıÄınızı bildiriyorsa, bu aslında "
-"kötücül bir gözetim özelliÄidir."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8569,6 +8563,22 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"ÃoÄu çalıÅan özgür olmayan yazılım kullanıyor, bunların
içerisinde <a href="
+"\"https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-"
+"feel-the-heat-as-bosses-ramp-up-remote-surveillance\"> evde çalıÅan "
+"personeli gözetleyen ve izleyen</a> telekonferans yazılımları da var.
EÄer "
+"program “etkin” olup olmadıÄınızı bildiriyorsa, bu aslında "
+"kötücül bir gözetim özelliÄidir."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- zh-cn.po 2 Nov 2020 11:01:45 -0000 1.63
+++ zh-cn.po 2 Nov 2020 15:03:01 -0000 1.64
@@ -4318,6 +4318,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7571,20 +7581,6 @@
"”)</small>"
msgstr "<small>注ï¼è¿ç¯æç« ä¸âfreeâçæææ¯âå
è´¹çâã</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-"许å¤é主使ç¨éèªç±è½¯ä»¶ï¼å
æ¬è§é¢ä¼è®®è½¯ä»¶ï¼æ¥ <a
href=\"https://www."
-"theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-"
-"bosses-ramp-up-remote-surveillance\">çè§åçæ§å¨å®¶åå
¬çåå·¥</a>ãå¦æ该ç¨åº"
-"æ±æ¥ä½ æ¯å¦ “å¨æ´»è·ï¼å·¥ä½ï¼ï¼”é£ä¹å®å®é
ä¸å°±æ¯å¨çè§ã"
-
#
#
#
@@ -8325,6 +8321,20 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+"许å¤é主使ç¨éèªç±è½¯ä»¶ï¼å
æ¬è§é¢ä¼è®®è½¯ä»¶ï¼æ¥ <a
href=\"https://www."
+"theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-"
+"bosses-ramp-up-remote-surveillance\">çè§åçæ§å¨å®¶åå
¬çåå·¥</a>ãå¦æ该ç¨åº"
+"æ±æ¥ä½ æ¯å¦ “å¨æ´»è·ï¼å·¥ä½ï¼ï¼”é£ä¹å®å®é
ä¸å°±æ¯å¨çè§ã"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- zh-tw.po 2 Nov 2020 11:01:45 -0000 1.223
+++ zh-tw.po 2 Nov 2020 15:03:01 -0000 1.224
@@ -4332,6 +4332,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+"setup-now-prevents-local-account-creation/\">tricking users to create an "
+"account on their network</a> to be able to install and use the Windows "
+"operating system, which is malware. The account can be used for surveillance "
+"and/or violating people's rights in many ways, such as turning their "
+"purchased software to a subscription product."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
"future_tense/2012/07/20/"
"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
@@ -7726,16 +7736,6 @@
"”)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Many employers are using nonfree software, including videoconference "
-"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
-"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
-"\"> surveil and monitor staff working at home</a>. If the program reports "
-"whether you are “active,” that is in effect a malicious "
-"surveillance feature."
-msgstr ""
-
#
#
#
@@ -8502,6 +8502,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Many employers are using nonfree software, including videoconference "
+"software, to <a href=\"https://www.theguardian.com/world/2020/sep/27/"
+"shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"
+"\"> surveil and monitor staff working at home</a>. If the program reports "
+"whether you are “active,” that is in effect a malicious "
+"surveillance feature."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"“Bossware” is malware that bosses <a href=\"https://www.eff.org/"
"deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers\"> "
"coerce workers into installing in their own computers</a>, so the bosses can "
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/16
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/25