[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 14 Nov 2020 04:33:03 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/14 04:33:02
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.es.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.330&r2=1.331
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.407&r2=1.408
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.352&r2=1.353
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.556&r2=1.557
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.364&r2=1.365
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.346&r2=1.347
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.643&r2=1.644
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.415&r2=1.416
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.504&r2=1.505
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.231&r2=1.232
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- de.po 10 Nov 2020 17:37:39 -0000 1.231
+++ de.po 14 Nov 2020 09:32:55 -0000 1.232
@@ -6165,6 +6165,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -7357,6 +7366,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -12091,9 +12110,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+450+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2017,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -12101,8 +12120,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -12456,41 +12475,6 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
-# | [-uses-] {+misuses+} the [-term <a
-# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
-# | {+word “<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
-# | “crackers.”)</small>+}
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\">“monetize”</a>."
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
-"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -13640,6 +13624,41 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
+# | [-uses-] {+misuses+} the [-term <a
+# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
+# | {+word “<a
+# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
+# | “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#| "words-to-avoid.html#Monetize\">“monetize”</a>."
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
+"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -14217,6 +14236,20 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
#~ msgid ""
#~ "Windows 10 S was a jail: <a href=\"https://www.theguardian.com/"
#~ "technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison\"> "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.330
retrieving revision 1.331
diff -u -b -r1.330 -r1.331
--- es.po 11 Nov 2020 10:31:30 -0000 1.330
+++ es.po 14 Nov 2020 09:32:55 -0000 1.331
@@ -5907,6 +5907,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -7201,6 +7210,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -12211,22 +12230,22 @@
"de ser engañado."
#. type: Content of: <div><p>
-# | As of [-August,-] {+September,+} 2020, the pages in this directory list
+# | As of [-September,-] {+November,+} 2020, the pages in this directory list
# | around 450 instances of malicious functionalities (with more than
-# | 5[-3-]{+4+}0 references to back them up), but there are surely thousands
+# | 5[-4-]{+5+}0 references to back them up), but there are surely thousands
# | more we don't know about.
#, fuzzy
#| msgid ""
-#| "As of August, 2020, the pages in this directory list around 450 instances "
-#| "of malicious functionalities (with more than 530 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
-"Hasta agosto de 2020, las páginas de este directorio ofrecÃan una lista de "
-"alrededor de 450 ejemplos de funcionalidades maliciosas (con más de 530 "
+"Hasta septiembre de 2020, las páginas de este directorio ofrecÃan una lista
"
+"de alrededor de 450 ejemplos de funcionalidades maliciosas (con más de 540 "
"referencias de apoyo), pero seguramente hay miles más que desconocemos."
#. type: Content of: <div><table><tr><th>
@@ -12466,49 +12485,6 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"Los relojes con software privativo conectados a internet son <cite>malware</"
-"cite> que vulnera la privacidad de la gente (en especial de los niños). "
-"Además, tienen un montón de fallos de seguridad. <a
href=\"https://www.wired."
-"com/story/kid-smartwatch-security-vulnerabilities/\">Permiten a delincuentes "
-"informáticos (y personas sin autorización) el acceso</a> al reloj."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"De este modo, personas no autorizadas con malas intenciones pueden "
-"interceptar las comunicaciones entre los padres y el hijo y enviar mensajes "
-"falsificados a y desde el reloj que pueden poner en peligro al niño."
-
-#. type: Content of: <div><ul><li><p>
-# | <small>(Note that this article misuses the word[-s-] “<a
-# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
-# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
-# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
-#, fuzzy
-#| msgid ""
-#| "<small>(Note that this article misuses the words “<a href=\"/"
-#| "philosophy/free-sw.html\">free software</a>” referring to zero "
-#| "price.)</small>"
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
-"philosophy/free-sw.html\">software libre</a>” para referirse a "
-"gratuito.)</small>"
-
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -13659,6 +13635,49 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+"Los relojes con software privativo conectados a internet son <cite>malware</"
+"cite> que vulnera la privacidad de la gente (en especial de los niños). "
+"Además, tienen un montón de fallos de seguridad. <a
href=\"https://www.wired."
+"com/story/kid-smartwatch-security-vulnerabilities/\">Permiten a delincuentes "
+"informáticos (y personas sin autorización) el acceso</a> al reloj."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+"De este modo, personas no autorizadas con malas intenciones pueden "
+"interceptar las comunicaciones entre los padres y el hijo y enviar mensajes "
+"falsificados a y desde el reloj que pueden poner en peligro al niño."
+
+#. type: Content of: <div><div><ul><li><p>
+# | <small>(Note that this article misuses the word[-s-] “<a
+# | [-href=\"/philosophy/free-sw.html\">free software</a>” referring-]
+# | {+href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”+} to
+# | [-zero price.)</small>-] {+mean “crackers.”)</small>+}
+#, fuzzy
+#| msgid ""
+#| "<small>(Note that this article misuses the words “<a href=\"/"
+#| "philosophy/free-sw.html\">free software</a>” referring to zero "
+#| "price.)</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Advierta que este artÃculo emplea mal las palabras “<a
href=\"/"
+"philosophy/free-sw.html\">software libre</a>” para referirse a "
+"gratuito.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -14143,6 +14162,21 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of August, 2020, the pages in this directory list around 450 "
+#~| "instances of malicious functionalities (with more than 530 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta agosto de 2020, las páginas de este directorio ofrecÃan una lista "
+#~ "de alrededor de 450 ejemplos de funcionalidades maliciosas (con más de "
+#~ "530 referencias de apoyo), pero seguramente hay miles más que "
+#~ "desconocemos."
+
#~ msgid "First item"
#~ msgstr "Primera entrada"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.407
retrieving revision 1.408
diff -u -b -r1.407 -r1.408
--- fr.po 11 Nov 2020 12:38:14 -0000 1.407
+++ fr.po 14 Nov 2020 09:32:56 -0000 1.408
@@ -5180,6 +5180,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -6279,6 +6288,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -10579,9 +10598,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-September,-] {+November,+} 2020, the pages in this directory list
+# | around 450 instances of malicious functionalities (with more than
+# | 5[-4-]{+5+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"En septembre 2020, les pages de ce répertoire dénombraient à peu près 450
"
@@ -10806,42 +10834,6 @@
msgid "Latest additions"
msgstr "Ajouts récents"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"Les montres connectées utilisant du logiciel privateur sont des objets "
-"malfaisants, car elles violent la vie privée des gens et en particulier des "
-"enfants. De plus, elles ont un grand nombre de vulnérabilités. <a href="
-"\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">Les "
-"briseurs de sécurité peuvent y accéder</a> ainsi que des personnes non "
-"autorisées."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"Ainsi, des personnes non autorisées et mal intentionnées peuvent
intercepter "
-"les communications entre un parent et son enfant et contrefaire des messages "
-"Ã destination ou en provenance de la montre, ce qui peut mettre l'enfant en "
-"danger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » pour désigner des pirates
informatiques "
-"â aussi appelés crackers.)</small>"
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11839,6 +11831,42 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+"Les montres connectées utilisant du logiciel privateur sont des objets "
+"malfaisants, car elles violent la vie privée des gens et en particulier des "
+"enfants. De plus, elles ont un grand nombre de vulnérabilités. <a href="
+"\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">Les "
+"briseurs de sécurité peuvent y accéder</a> ainsi que des personnes non "
+"autorisées."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+"Ainsi, des personnes non autorisées et mal intentionnées peuvent
intercepter "
+"les communications entre un parent et son enfant et contrefaire des messages "
+"Ã destination ou en provenance de la montre, ce qui peut mettre l'enfant en "
+"danger."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
+"to-avoid.html#Hacker\">hackers</a> » pour désigner des pirates
informatiques "
+"â aussi appelés crackers.)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -12262,5 +12290,14 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En septembre 2020, les pages de ce répertoire dénombraient à peu près
450 "
+#~ "cas de fonctionnalités malveillante (appuyés par plus de 540
références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."
+
#~ msgid "First item"
#~ msgstr " "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- it.po 10 Nov 2020 17:37:39 -0000 1.231
+++ it.po 14 Nov 2020 09:32:56 -0000 1.232
@@ -5763,6 +5763,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -6872,6 +6881,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -11218,9 +11237,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+450+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2017,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -11228,8 +11247,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -11592,29 +11611,6 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -12747,6 +12743,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -13315,6 +13334,20 @@
#, fuzzy
#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
+#, fuzzy
+#~| msgid ""
#~| "<a href=\"http://motherboard.vice.com/read/switzerland-wants-a-single-"
#~| "universal-phone-charger-by-2017\"> Apple uses DRM software to prevent "
#~| "people from charging an iThing with a generic USB cable</a>."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- ja.po 10 Nov 2020 17:37:40 -0000 1.239
+++ ja.po 14 Nov 2020 09:32:56 -0000 1.240
@@ -4462,6 +4462,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -5381,6 +5390,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -8823,8 +8842,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -9057,29 +9076,6 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -10042,6 +10038,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -10493,6 +10512,19 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ã"
+#~
"ã¾ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
+
#~ msgid ""
#~ "<a href=\"https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-"
#~ "wants-a-single-universal-phone-charger-by-2017\"> Apple uses DRM software "
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-google.de-diff.html 6 Oct 2020 08:42:18 -0000 1.49
+++ malware-google.de-diff.html 14 Nov 2020 09:32:56 -0000 1.50
@@ -372,6 +372,15 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M201604050"></em></ins></span>
<p>Revolv is <span class="removed"><del><strong>an
IoT</strong></del></span> <span class="inserted"><ins><em>a</em></ins></span>
device <span class="removed"><del><strong>which</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> managed “smart
home”
operations: switching <span
class="removed"><del><strong>the</strong></del></span> lights, operate motion
sensors, regulating
@@ -379,12 +388,12 @@
to do these tasks.</em></ins></span> On May 15th, 2016, <span
class="removed"><del><strong>Google said</strong></del></span> <span
class="inserted"><ins><em>Google/Alphabet <a
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally
broke</em></ins></span> it <span class="removed"><del><strong>would
shut</strong></del></span> <span class="inserted"><ins><em>by
shutting</em></ins></span> down the
- <span class="removed"><del><strong>service linked
to</strong></del></span> <span
class="inserted"><ins><em>server</a>.</p>
+ <span class="removed"><del><strong>service linked to the device,
making</strong></del></span> <span
class="inserted"><ins><em>server</a>.</p>
- <p>If it were free software, users would have</em></ins></span> the
<span class="removed"><del><strong>device, making</strong></del></span> <span
class="inserted"><ins><em>ability to make</em></ins></span> it <span
class="removed"><del><strong>unusable.</p>
- <p>Although you may own the device, its functioning depended on the
server
- that never belonged to you. So you never really had
control</strong></del></span>
- <span class="inserted"><ins><em>work again, differently, and then have a
freedom-respecting home
+ <p>If</em></ins></span> it <span
class="removed"><del><strong>unusable.</p>
+ <p>Although you may own the device, its functioning depended
on</strong></del></span> <span class="inserted"><ins><em>were free software,
users would have</em></ins></span> the <span class="removed"><del><strong>server
+ that never belonged</strong></del></span> <span
class="inserted"><ins><em>ability</em></ins></span> to <span
class="removed"><del><strong>you. So you never really had
control</strong></del></span> <span class="inserted"><ins><em>make it
+ work again, differently, and then have a freedom-respecting home
instead</em></ins></span> of <span class="removed"><del><strong>it. This
unjust design is called
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
@@ -414,12 +423,12 @@
<li id="M202008030">
<p>Google Nest <a
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a</em></ins></span> software
- <span class="inserted"><ins><em>update to its speaker devices using their
back door <a
+ is taking over ADT</a>. Google sent out a software
+ update to its speaker devices using their back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
- than just their wake words. Google says the software update was sent
+ than just their wake words. Google says the</em></ins></span> software
<span class="inserted"><ins><em>update was sent
out prematurely and on accident and Google was planning on disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
@@ -762,7 +771,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:18 $
+$Date: 2020/11/14 09:32:56 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-google.de.po 6 Oct 2020 08:42:18 -0000 1.63
+++ malware-google.de.po 14 Nov 2020 09:32:56 -0000 1.64
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -668,6 +668,15 @@
"bestimmter Google-Software schaden zufügen."
#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
# | Revolv is [-an IoT-] {+a+} device [-which-] {+that+} managed “smart
# | home” operations: switching [-the-] lights, operate motion sensors,
# | regulating temperature, etc. {+Its proprietary software depends on a
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-google.es.po 6 Oct 2020 10:37:49 -0000 1.54
+++ malware-google.es.po 14 Nov 2020 09:32:57 -0000 1.55
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-10-06 12:34+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -512,6 +513,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Revolv is a device that managed “smart home” operations: "
"switching lights, operate motion sensors, regulating temperature, etc. Its "
"proprietary software depends on a remote server to do these tasks. On May "
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- malware-google.fr.po 6 Oct 2020 16:31:47 -0000 1.111
+++ malware-google.fr.po 14 Nov 2020 09:32:57 -0000 1.112
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-08-20 10:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -509,6 +510,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Revolv is a device that managed “smart home” operations: "
"switching lights, operate motion sensors, regulating temperature, etc. Its "
"proprietary software depends on a remote server to do these tasks. On May "
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-google.pot 6 Oct 2020 08:42:18 -0000 1.58
+++ malware-google.pot 14 Nov 2020 09:32:57 -0000 1.59
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -374,6 +374,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a "
+"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\">lets
"
+"banks and creditors deactivate people's Android devices</a> if they fail to "
+"make payments. If someone's device gets deactivated, it will be limited to "
+"basic functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Revolv is a device that managed “smart home” operations: "
"switching lights, operate motion sensors, regulating temperature, etc. Its "
"proprietary software depends on a remote server to do these tasks. On May "
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-google.ru.po 6 Oct 2020 08:42:18 -0000 1.124
+++ malware-google.ru.po 14 Nov 2020 09:32:57 -0000 1.125
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -510,6 +511,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Revolv is a device that managed “smart home” operations: "
"switching lights, operate motion sensors, regulating temperature, etc. Its "
"proprietary software depends on a remote server to do these tasks. On May "
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-microsoft.de-diff.html 7 Nov 2020 10:01:52 -0000 1.57
+++ malware-microsoft.de-diff.html 14 Nov 2020 09:32:57 -0000 1.58
@@ -159,14 +159,16 @@
away from</em></ins></span> Windows 8 <span
class="removed"><del><strong>also has a</strong></del></span> <span
class="inserted"><ins><em>computers with TPM 2.0</a> (<a
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
article in German</a>), due to potential</em></ins></span> back
- door <span class="inserted"><ins><em>capabilities of the TPM 2.0
chip.</p>
+ door <span class="removed"><del><strong>for remotely deleting
apps</a>.</p>
+
+ <p>You might well decide to let a</strong></del></span> <span
class="inserted"><ins><em>capabilities of the TPM 2.0 chip.</p>
</li>
<li id="M201307300">
<p>Here is a suspicion that
we can't prove, but is worth thinking about: <a
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
- Writable microcode</em></ins></span> for <span
class="removed"><del><strong>remotely</strong></del></span> <span
class="inserted"><ins><em>Intel and AMD microprocessors</a> may be a
+ Writable microcode for Intel and AMD microprocessors</a> may be a
vehicle for the NSA to invade computers, with the help of Microsoft,
say respected security experts.</p>
</li>
@@ -174,9 +176,9 @@
<li id="M201112080.1">
<p>Windows 8 also has a back door for <a
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely</em></ins></span> deleting apps</a>.</p>
+ remotely deleting apps</a>.</p>
- <p>You might well decide to let a security service that you trust
+ <p>You might well decide to let a</em></ins></span> security service
that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.</p></li>
@@ -284,16 +286,12 @@
<p>This</em></ins></span> section <span class="removed"><del><strong>are
not precisely malware, since they do
not involve making</strong></del></span> <span class="inserted"><ins><em>gives
examples of Microsoft software harassing or annoying</em></ins></span>
the <span class="removed"><del><strong>program that runs in a way that
hurts</strong></del></span> <span class="inserted"><ins><em>user, or causing
trouble for</em></ins></span> the user.
-<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions</em></ins></span> are <span
class="removed"><del><strong>a lot</strong></del></span> like <span
class="removed"><del><strong>malware, since they are technical Microsoft
-actions that harm to</strong></del></span>
-<span class="inserted"><ins><em>sabotage but</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>word “sabotage” is too strong for
them.</p>
+<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions are like
+sabotage but the word “sabotage” is too strong for them.</p>
<ul class="blurbs">
<li id="M201809120">
- <p>One version</em></ins></span> of <span
class="removed"><del><strong>specific Microsoft software.</p>
-
-<ul>
- <li><p></strong></del></span> <span
class="inserted"><ins><em>Windows 10 <a
+ <p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
harangues users if they try to install Firefox (or
Chrome)</a>.</p>
</li>
@@ -313,7 +311,7 @@
intrusive ads for Microsoft products and its partners'
products</a>.</p>
- <p>The article's author starts from the premise
that</em></ins></span> Microsoft <span class="inserted"><ins><em>has
+ <p>The article's author starts from the premise that Microsoft has
a right to control what Windows does to users, as long as it doesn't
go “too far”. We disagree.</p>
</li>
@@ -375,8 +373,8 @@
<p>The wrongs in this section are not precisely malware, since they do
not involve making the program that runs in a way that hurts the user.
-But they are a lot like malware, since they are technical Microsoft
-actions that harm the users of specific Microsoft software.</p>
+But they</em></ins></span> are a lot like malware, since they are technical
Microsoft
+actions that harm <span class="inserted"><ins><em>the users of specific
Microsoft software.</p>
<ul class="blurbs">
<li id="M201904041">
@@ -386,8 +384,8 @@
program</a> on computers running certain
versions of Windows 10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909">
- tampering with users' settings and files</a>, notably to
- “repair” any components of the updating system that users
+ tampering with users' settings and files</a>,
notably</em></ins></span> to
+ <span class="inserted"><ins><em>“repair” any components of the
updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
@@ -400,7 +398,10 @@
href="/distros/free-distros.html">free operating system</a> if you
can!</p>
- <p>If your employer makes you run Windows, tell the financial
+ <p>If your employer makes you run Windows, tell</em></ins></span>
the <span class="removed"><del><strong>users of specific Microsoft
software.</p>
+
+<ul>
+ <li><p> Microsoft</strong></del></span> <span
class="inserted"><ins><em>financial
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
@@ -458,7 +459,7 @@
<p>This demonstrates what we've said for years: using proprietary
software means letting someone have power over you, and you're going
- to get screwed sooner <span class="removed"><del><strong>or
later.</p></li>
+ to get screwed sooner or <span
class="removed"><del><strong>later.</p></li>
<li><p>Microsoft
has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
@@ -467,35 +468,33 @@
<a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
AMD and Qualcomm CPUs, too</a>.
</p>
- <p>Of course, Windows 7 and 8 are unethical too, because they are
- proprietary software. But this example of Microsoft's wielding its
- power demonstrates the power it holds.
+ <p>Of course, Windows 7 and 8 are unethical too, because they
are</strong></del></span> <span class="inserted"><ins><em>later.</p>
+ </li>
+
+ <li id="M201601310">
+ <p>FTDI's</em></ins></span> proprietary <span
class="removed"><del><strong>software. But this example of Microsoft's
wielding</strong></del></span> <span class="inserted"><ins><em>driver
+ for</em></ins></span> its
+ <span class="removed"><del><strong>power demonstrates the power it holds.
</p>
<p>Free software developers also stop maintaining old versions of
their programs, but this is not unfair to users because the
users of free software have control over it. If it is important
- enough to you, you and other users can hire someone to support
+ enough to you, you and other users can hire someone</strong></del></span>
<span class="inserted"><ins><em>USB-to-serial chips has been
designed</em></ins></span> to <span class="removed"><del><strong>support
the old version on your future platforms.
</p></li>
<li><p>Microsoft
- is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ is</strong></del></span> <a <span
class="removed"><del><strong>href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
forcibly pushing Windows
- update to its version 10</a>, ignoring the flag on Windows 7 or 8
- that you could set</strong></del></span> <span
class="inserted"><ins><em>or later.</p>
- </li>
-
- <li id="M201601310">
- <p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
- a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
+ update to its version 10</a>, ignoring the flag on Windows 7 or
8</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ alternative compatible chips</a>
+ so</em></ins></span> that <span class="removed"><del><strong>you could set
to not upgrade. This reaffirms the presence of
+ a</strong></del></span> <span class="inserted"><ins><em>they no longer
work. Microsoft is</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
back door in Windows</a> 7 and 8.</p></li>
<li><p>Windows</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
- alternative compatible chips</a>
- so that they no longer work. Microsoft is <a
-
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
+ <span
class="inserted"><ins><em>href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
@@ -606,41 +605,52 @@
<span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft
-<a
-href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice</strong></del></span>
- and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>use the Windows operating system, which is malware.
The account can
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft</strong></del></span>
+ <span class="inserted"><ins><em>and use the Windows operating system,
which is malware. The account can
be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p></em></ins></span>
+ such as turning their purchased software to a subscription
product.</p>
+ </li>
+
+ <li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to the recordings</a>.</p>
+
+ <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span>
+ <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
+users obnoxiously and repeatedly</strong></del></span>
- <span class="inserted"><ins><em><li id="M201908210">
- <p>Microsoft recorded</em></ins></span> users <span
class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>of Xboxes</em></ins></span> and <span
class="removed"><del><strong>repeatedly to install Windows
10</a>.</p></li>
+ <span class="inserted"><ins><em><li id="M201908151">
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>install Windows 10</a>.</p></li>
<li><p>Microsoft
<a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking
- users</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+ users</a></strong></del></span> <span
class="inserted"><ins><em>say whether it can</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing Windows 7 with Windows 10</a>.</p></li>
<li><p>Microsoft has made companies' Windows machines managed by
the
company's
-sysadmins</strong></del></span> <span
class="inserted"><ins><em>had</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
-users to complain</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to the <span
class="removed"><del><strong>sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+sysadmins</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ on calls</a>.</p>
- <p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
+ <p>That almost certainly means it can do so.</p>
</li>
- <li id="M201908151">
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Windows
+ <li id="M201905281">
+ <p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in
order</em></ins></span> to <span class="inserted"><ins><em>create an account
on</em></ins></span>
+ the <span class="removed"><del><strong>sysadmins about not
“upgrading” to Windows
10</a>.</p></li>
</ul>
@@ -648,11 +658,9 @@
<ul>
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
</li>
<li id="M201710134">
@@ -1013,7 +1021,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:52 $
+$Date: 2020/11/14 09:32:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- malware-microsoft.de.po 7 Nov 2020 10:01:53 -0000 1.153
+++ malware-microsoft.de.po 14 Nov 2020 09:32:57 -0000 1.154
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1024,6 +1024,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- malware-microsoft.es.po 8 Nov 2020 10:29:08 -0000 1.183
+++ malware-microsoft.es.po 14 Nov 2020 09:32:58 -0000 1.184
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -852,6 +853,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- malware-microsoft.fr.po 7 Nov 2020 12:26:44 -0000 1.198
+++ malware-microsoft.fr.po 14 Nov 2020 09:32:59 -0000 1.199
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-07 13:25+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -851,6 +852,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-microsoft.it-diff.html 7 Nov 2020 10:01:54 -0000 1.56
+++ malware-microsoft.it-diff.html 14 Nov 2020 09:32:59 -0000 1.57
@@ -160,14 +160,16 @@
away from</em></ins></span> Windows 8 <span
class="removed"><del><strong>also has a</strong></del></span> <span
class="inserted"><ins><em>computers with TPM 2.0</a> (<a
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
article in German</a>), due to potential</em></ins></span> back
- door <span class="inserted"><ins><em>capabilities of the TPM 2.0
chip.</p>
+ door <span class="removed"><del><strong>for remotely deleting
apps</a>.</p>
+
+ <p>You might well decide to let a</strong></del></span> <span
class="inserted"><ins><em>capabilities of the TPM 2.0 chip.</p>
</li>
<li id="M201307300">
<p>Here is a suspicion that
we can't prove, but is worth thinking about: <a
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
- Writable microcode</em></ins></span> for <span
class="removed"><del><strong>remotely</strong></del></span> <span
class="inserted"><ins><em>Intel and AMD microprocessors</a> may be a
+ Writable microcode for Intel and AMD microprocessors</a> may be a
vehicle for the NSA to invade computers, with the help of Microsoft,
say respected security experts.</p>
</li>
@@ -175,9 +177,9 @@
<li id="M201112080.1">
<p>Windows 8 also has a back door for <a
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely</em></ins></span> deleting apps</a>.</p>
+ remotely deleting apps</a>.</p>
- <p>You might well decide to let a security service that you trust
+ <p>You might well decide to let a</em></ins></span> security service
that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.</p></li>
@@ -285,16 +287,12 @@
<p>This</em></ins></span> section <span class="removed"><del><strong>are
not precisely malware, since they do
not involve making</strong></del></span> <span class="inserted"><ins><em>gives
examples of Microsoft software harassing or annoying</em></ins></span>
the <span class="removed"><del><strong>program that runs in a way that
hurts</strong></del></span> <span class="inserted"><ins><em>user, or causing
trouble for</em></ins></span> the user.
-<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions</em></ins></span> are <span
class="removed"><del><strong>a lot</strong></del></span> like <span
class="removed"><del><strong>malware, since they are technical Microsoft
-actions that harm to</strong></del></span>
-<span class="inserted"><ins><em>sabotage but</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>word “sabotage” is too strong for
them.</p>
+<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions are like
+sabotage but the word “sabotage” is too strong for them.</p>
<ul class="blurbs">
<li id="M201809120">
- <p>One version</em></ins></span> of <span
class="removed"><del><strong>specific Microsoft software.</p>
-
-<ul>
- <li><p></strong></del></span> <span
class="inserted"><ins><em>Windows 10 <a
+ <p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
harangues users if they try to install Firefox (or
Chrome)</a>.</p>
</li>
@@ -304,99 +302,70 @@
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
impose use of its browser, Edge, in certain
circumstances</a>.</p>
- <p>The reason</em></ins></span> Microsoft <span
class="inserted"><ins><em>can force things on users is that Windows
+ <p>The reason Microsoft can force things on users is that Windows
is nonfree.</p>
</li>
<li id="M201703170">
- <p>Windows displays</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads</em></ins></span> for <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>Microsoft products</em></ins></span> and <span
class="removed"><del><strong>8 on recent processors</a>
- in</strong></del></span> <span class="inserted"><ins><em>its partners'
+ <p>Windows displays <a
+
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for Microsoft products and its partners'
products</a>.</p>
- <p>The article's author starts from the premise that Microsoft
has</em></ins></span>
- a <span class="removed"><del><strong>big hurry.</p>
- <p>It makes no difference</strong></del></span> <span
class="inserted"><ins><em>right to control</em></ins></span> what <span
class="removed"><del><strong>legitimate reasons Microsoft might
- have for not doing work</strong></del></span> <span
class="inserted"><ins><em>Windows does</em></ins></span> to <span
class="removed"><del><strong>support them. If</strong></del></span> <span
class="inserted"><ins><em>users, as long as</em></ins></span> it doesn't <span
class="removed"><del><strong>want to
- do this work, it should let users do</strong></del></span>
- <span class="inserted"><ins><em>go “too far”. We
disagree.</p>
+ <p>The article's author starts from the premise that Microsoft has
+ a right to control what Windows does to users, as long as it doesn't
+ go “too far”. We disagree.</p>
</li>
<li id="M201612140">
<p>The Microsoft Telemetry Compatibility service <a
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces</em></ins></span> the <span
class="removed"><del><strong>work.</p></strong></del></span> <span
class="inserted"><ins><em>performances of machines running
- Windows 10</a>, and can't be disabled
easily.</p></em></ins></span>
+ drastically reduces the performances of machines running
+ Windows 10</a>, and can't be disabled easily.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Microsoft has made</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608170">
+ <li id="M201608170">
<p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
- on computers that were running</em></ins></span> Windows 7 and <span
class="removed"><del><strong>8 cease to function on certain
- new computers,</strong></del></span> <span class="inserted"><ins><em>8,
Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
- forcing their owners</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- repeatedly switched on a flag that urged users</em></ins></span> to <span
class="removed"><del><strong>switch</strong></del></span>
- <span class="inserted"><ins><em>“upgrade”</em></ins></span> to
Windows <span class="removed"><del><strong>10</a>.</p>
- </li>
-
- <li><p>Once</strong></del></span> <span
class="inserted"><ins><em>10</a> when they had turned
+ on computers that were running Windows 7 and 8, Microsoft <a
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ repeatedly switched on a flag that urged users to
+ “upgrade” to Windows 10</a> when they had turned
it off, in the hope that some day they would fail to say no.
- To do this,</em></ins></span> Microsoft <span
class="removed"><del><strong>has tricked a user into accepting
installation</strong></del></span> <span class="inserted"><ins><em>used <a
+ To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
<p>A detailed <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- analysis</em></ins></span> of <span class="inserted"><ins><em>Microsoft's
scheme</a> is available on the Electronic
+ analysis of Microsoft's scheme</a> is available on the Electronic
Frontier Foundation's website.</p>
</li>
<li id="M201603090">
- <p>Microsoft has made companies'</em></ins></span>
- Windows
- <span class="removed"><del><strong>10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied</strong></del></span> <span
class="inserted"><ins><em>machines managed by</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>company's sysadmins <a
+ <p>Microsoft has made companies'
+ Windows machines managed by the company's sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
- users to complain</em></ins></span> to <span
class="removed"><del><strong>cancel or even postpone</strong></del></span> the
- <span class="removed"><del><strong>imposed date of installation</a>.
- </p>
- <p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you, and you're
- going</strong></del></span> <span class="inserted"><ins><em>sysadmins about
not “upgrading”</em></ins></span>
- to <span class="removed"><del><strong>get screwed sooner or
later.</p></li>
-
- <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>Windows 10</a>.</p>
+ users to complain to the sysadmins about not “upgrading”
+ to Windows 10</a>.</p>
</li>
<li id="M201601160">
- <p>Microsoft</em></ins></span> has <a
+ <p>Microsoft has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
all future Intel CPUs for Windows 7 and 8</a>. Those
machines will be stuck with the nastier Windows 10. <a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
- AMD and Qualcomm CPUs, <span class="removed"><del><strong>too</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ AMD and Qualcomm CPUs, too</a>.</p>
<p>Of course, Windows 7 and 8 are unethical too, because they are
proprietary software. But this example of Microsoft's wielding its
- power demonstrates the power it <span class="removed"><del><strong>holds.
- </p></strong></del></span> <span
class="inserted"><ins><em>holds.</p></em></ins></span>
+ power demonstrates the power it holds.</p>
<p>Free software developers also stop maintaining old versions of
their programs, but this is not unfair to users because the users of
free software have control over it. If it is important enough to you,
you and other users can hire someone to support the old version on
- your future <span class="removed"><del><strong>platforms.
- </p></li>
-
- <li><p>Microsoft
- is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- forcibly pushing</strong></del></span> <span
class="inserted"><ins><em>platforms.</p>
+ your future platforms.</p>
</li>
</ul>
@@ -405,8 +374,8 @@
<p>The wrongs in this section are not precisely malware, since they do
not involve making the program that runs in a way that hurts the user.
-But they are a lot like malware, since they are technical Microsoft
-actions that harm the users of specific Microsoft software.</p>
+But they</em></ins></span> are a lot like malware, since they are technical
Microsoft
+actions that harm <span class="inserted"><ins><em>the users of specific
Microsoft software.</p>
<ul class="blurbs">
<li id="M201904041">
@@ -414,11 +383,10 @@
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/">
force-installing a “remediation”
program</a> on computers running certain
- versions of</em></ins></span> Windows
- <span class="removed"><del><strong>update</strong></del></span> <span
class="inserted"><ins><em>10. Remediation, in Microsoft's view, means <a
+ versions of Windows 10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909">
- tampering with users' settings and files</a>,
notably</em></ins></span> to <span class="removed"><del><strong>its version
10</a>, ignoring</strong></del></span>
- <span class="inserted"><ins><em>“repair” any components
of</em></ins></span> the <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>updating system that users
+ tampering with users' settings and files</a>, notably to
+ “repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
@@ -427,26 +395,29 @@
<p>This exemplifies the arrogant and manipulative attitude
that proprietary software developers have learned to adopt
- toward the people they are supposedly serving. Migrate to a <a
+ toward the people they are supposedly serving. Migrate</em></ins></span>
to <span class="inserted"><ins><em>a <a
href="/distros/free-distros.html">free operating system</a> if you
can!</p>
- <p>If your employer makes you run Windows, tell the financial
+ <p>If your employer makes you run Windows, tell</em></ins></span>
the <span class="removed"><del><strong>users of specific Microsoft
software.</p>
+
+<ul>
+ <li><p> Microsoft</strong></del></span> <span
class="inserted"><ins><em>financial
department how this wastes your time dealing with endless connections
and premature hardware failures.</p>
</li>
<li id="M201704194">
<p>Microsoft has made Windows 7
- and 8 cease to function</em></ins></span> on <span
class="inserted"><ins><em>certain new computers, <a
+ and 8 cease to function on certain new computers, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
<li id="M201704134">
- <p>Microsoft <a
+ <p>Microsoft</em></ins></span> <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for</em></ins></span> Windows 7 <span
class="removed"><del><strong>or</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> 8 <span
class="inserted"><ins><em>on recent processors</a>
+ has dropped support for Windows 7 and 8 on recent processors</a>
in a big hurry.</p>
<p>It makes no difference what legitimate reasons Microsoft might
@@ -454,45 +425,76 @@
this work, it should let users do the work.</p>
</li>
- <li id="M201606270">
- <p id="windows10-forcing">In its efforts to trick users of Windows
- 7 and 8 into installing all-spying Windows 10 against their
- will, Microsoft forced their computers to <a
+ <span class="removed"><del><strong><li>
+ <p>Microsoft has made</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606270">
+ <p id="windows10-forcing">In its efforts to trick users
of</em></ins></span> Windows
+ 7 and 8 <span class="removed"><del><strong>cease to function on certain
+ new computers,
+ <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ forcing</strong></del></span> <span class="inserted"><ins><em>into
installing all-spying Windows 10 against</em></ins></span> their <span
class="removed"><del><strong>owners to switch</strong></del></span>
+ <span class="inserted"><ins><em>will, Microsoft forced their
computers</em></ins></span> to <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- silently download… the whole of Windows 10</a>! Apparently,
+ silently download… the whole of</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p></strong></del></span>
<span class="inserted"><ins><em>10</a>! Apparently,
this was done through a <a
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
- found out</em></ins></span> that <span class="removed"><del><strong>you
could set</strong></del></span> <span class="inserted"><ins><em>this
“upgrade” was in fact a <a
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- downgrade</a>.</p>
+ downgrade</a>.</p></em></ins></span>
</li>
- <li id="M201606010">
- <p>Once Microsoft has tricked a user
- into accepting installation of Windows 10, <a
-
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ <span
class="removed"><del><strong><li><p>Once</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606010">
+ <p>Once</em></ins></span> Microsoft has tricked a user
+ into accepting installation of Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</em></ins></span>
find that they are denied the option to cancel or even postpone the
- imposed date of installation</a>.</p>
+ imposed date of <span class="removed"><del><strong>installation</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p></em></ins></span>
<p>This demonstrates what we've said for years: using proprietary
software means letting someone have power over you, and you're going
- to get screwed sooner or later.</p>
+ to get screwed sooner or <span
class="removed"><del><strong>later.</p></li>
+
+ <li><p>Microsoft
+ has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
+ all future Intel CPUs for Windows 7 and 8</a>. Those machines will
+ be stuck with the nastier Windows 10.
+ <a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
+ AMD and Qualcomm CPUs, too</a>.
+ </p>
+ <p>Of course, Windows 7 and 8 are unethical too, because they
are</strong></del></span> <span class="inserted"><ins><em>later.</p>
</li>
<li id="M201601310">
- <p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
- a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7 and 8.</p></li>
+ <p>FTDI's</em></ins></span> proprietary <span
class="removed"><del><strong>software. But this example of Microsoft's
wielding</strong></del></span> <span class="inserted"><ins><em>driver
+ for</em></ins></span> its
+ <span class="removed"><del><strong>power demonstrates the power it holds.
+ </p>
+ <p>Free software developers also stop maintaining old versions of
+ their programs, but this is not unfair to users because the
+ users of free software have control over it. If it is important
+ enough to you, you and other users can hire someone</strong></del></span>
<span class="inserted"><ins><em>USB-to-serial chips has been
designed</em></ins></span> to <span class="removed"><del><strong>support
+ the old version on your future platforms.
+ </p></li>
- <li><p>Windows</strong></del></span>
+ <li><p>Microsoft
+ is</strong></del></span> <a <span
class="removed"><del><strong>href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ forcibly pushing Windows
+ update to its version 10</a>, ignoring the flag on Windows 7 or
8</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
- so that they no longer work. Microsoft is <a
+ so</em></ins></span> that <span class="removed"><del><strong>you could set
to not upgrade. This reaffirms the presence of
+ a <a href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p></li>
+
+ <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
@@ -597,43 +599,52 @@
<span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their
network</a></em></ins></span> to <span
class="removed"><del><strong>increase Windows 10's install base, Microsoft
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft
<a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.
-</li>
+blatantly disregards user choice</strong></del></span>
+ and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>use the Windows operating system, which is malware.
The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software to a subscription
product.</p></em></ins></span>
+ </li>
-<li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
-users obnoxiously and repeatedly</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to install <span
class="removed"><del><strong>Windows 10</a>.</p></li>
+<span class="removed"><del><strong><li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
+ <p>Microsoft recorded</em></ins></span> users <span
class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>of Xboxes</em></ins></span> and <span
class="removed"><del><strong>repeatedly to install Windows
10</a>.</p></li>
<li><p>Microsoft
<a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking
- users</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+ users</a></strong></del></span> <span
class="inserted"><ins><em>had</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing Windows 7 with Windows 10</a>.</p></li>
<li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span>
- <span class="inserted"><ins><em>and use</em></ins></span> the
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to</em></ins></span> the
<span class="removed"><del><strong>company's
-sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
-users</strong></del></span> <span class="inserted"><ins><em>Windows operating
system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>a subscription product.</p>
- </li>
-
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to the <span
class="removed"><del><strong>sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+sysadmins</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
<li id="M201908151">
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Windows
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ on calls</a>.</p>
+
+ <p>That almost certainly means it can do so.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in
order</em></ins></span> to <span class="inserted"><ins><em>create an account
on</em></ins></span>
+ the <span class="removed"><del><strong>sysadmins about not
“upgrading” to Windows
10</a>.</p></li>
</ul>
@@ -641,11 +652,9 @@
<ul>
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
</li>
<li id="M201710134">
@@ -999,7 +1008,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:54 $
+$Date: 2020/11/14 09:32:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- malware-microsoft.it.po 7 Nov 2020 10:01:54 -0000 1.158
+++ malware-microsoft.it.po 14 Nov 2020 09:32:59 -0000 1.159
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -977,6 +977,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-microsoft.ja-diff.html 7 Nov 2020 10:01:55 -0000 1.71
+++ malware-microsoft.ja-diff.html 14 Nov 2020 09:32:59 -0000 1.72
@@ -174,9 +174,8 @@
</li>
<li id="M201307300">
- <p>Here is</em></ins></span> a <span
class="removed"><del><strong>security service</strong></del></span> <span
class="inserted"><ins><em>suspicion</em></ins></span> that <span
class="removed"><del><strong>you trust
- remotely</strong></del></span>
- <span class="inserted"><ins><em>we can't prove, but is worth thinking
about: <a
+ <p>Here is</em></ins></span> a <span
class="removed"><del><strong>security service</strong></del></span> <span
class="inserted"><ins><em>suspicion that
+ we can't prove, but is worth thinking about: <a
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
Writable microcode for Intel and AMD microprocessors</a> may be a
vehicle for the NSA to invade computers, with the help of Microsoft,
@@ -188,8 +187,8 @@
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
- <p>You might well decide to let a security service that you trust
- remotely</em></ins></span> <em>deactivate</em> programs that
it considers malicious.
+ <p>You might well decide to let a security service</em></ins></span>
that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.</p></li>
@@ -444,7 +443,7 @@
<li id="M201704134">
<p>Microsoft <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for</em></ins></span> Windows 7 <span
class="removed"><del><strong>or</strong></del></span> <span
class="inserted"><ins><em>and 8 on recent processors</a>
+ has dropped support for Windows 7 and 8 on recent processors</a>
in a big hurry.</p>
<p>It makes no difference what legitimate reasons Microsoft might
@@ -453,8 +452,8 @@
</li>
<li id="M201606270">
- <p id="windows10-forcing">In its efforts to trick users of Windows
- 7 and</em></ins></span> 8 <span class="inserted"><ins><em>into installing
all-spying Windows 10 against their
+ <p id="windows10-forcing">In its efforts to trick users
of</em></ins></span> Windows
+ 7 <span class="inserted"><ins><em>and 8 into installing all-spying Windows
10 against their
will, Microsoft forced their computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
silently download… the whole of Windows 10</a>! Apparently,
@@ -464,7 +463,7 @@
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
- found out</em></ins></span> that <span class="removed"><del><strong>you
could set</strong></del></span> <span class="inserted"><ins><em>this
“upgrade” was in fact a <a
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -473,22 +472,23 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied the option</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms</strong></del></span>
<span class="inserted"><ins><em>cancel or even postpone</em></ins></span> the
<span class="removed"><del><strong>presence</strong></del></span>
- <span class="inserted"><ins><em>imposed date</em></ins></span> of
- <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
+ find that they are denied the option to cancel or even postpone the
+ imposed date of installation</a>.</p>
<p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you,</em></ins></span> and
<span class="removed"><del><strong>8.</p></li>
-
- <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>you're going
- to get screwed sooner or later.</p>
+ software means letting someone have power over you, and you're going
+ to get screwed sooner</em></ins></span> or <span
class="removed"><del><strong>8
+ that you could set</strong></del></span> <span
class="inserted"><ins><em>later.</p>
</li>
<li id="M201601310">
<p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed to <a
-
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
+ a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p></li>
+
+ <li><p>Windows</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
@@ -606,14 +606,22 @@
started</strong></del></span>
<span class="inserted"><ins><em><li id="M201908151">
- <p>Skype refuses to say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
-users obnoxiously</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
<p>That almost certainly means it can do so.</p>
</li>
+ <li id="M201905281">
+ <p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their</em></ins></span> users
<span class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M201710134">
<p>Windows 10 telemetry program sends information to Microsoft about
the user's computer</em></ins></span> and <span
class="removed"><del><strong>repeatedly to install Windows
10</a>.</p></li>
@@ -974,7 +982,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/07 10:01:55 $
+$Date: 2020/11/14 09:32:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-microsoft.ja.po 7 Nov 2020 10:01:55 -0000 1.138
+++ malware-microsoft.ja.po 14 Nov 2020 09:32:59 -0000 1.139
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -802,6 +802,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- malware-microsoft.pot 7 Nov 2020 10:01:55 -0000 1.96
+++ malware-microsoft.pot 14 Nov 2020 09:32:59 -0000 1.97
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -586,6 +586,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a "
+"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
+"people to give their phone number</a> in order to create an account on the "
+"company's network. On top of mistreating their users by providing nonfree "
+"software, Microsoft is imposing surveillance on people and violating their "
+"privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- malware-microsoft.ru.po 7 Nov 2020 11:30:44 -0000 1.238
+++ malware-microsoft.ru.po 14 Nov 2020 09:32:59 -0000 1.239
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-07 09:55+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -847,6 +848,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-mobiles.de-diff.html 10 Nov 2020 17:37:40 -0000 1.86
+++ malware-mobiles.de-diff.html 14 Nov 2020 09:32:59 -0000 1.87
@@ -598,6 +598,15 @@
<h3 id="sabotage">Sabotage</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M201902041">
<p>Twenty nine “beauty camera” apps that used to be
on Google Play had one or more malicious functionalities, such
@@ -1618,7 +1627,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:40 $
+$Date: 2020/11/14 09:32:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-mobiles.de.po 10 Nov 2020 17:37:40 -0000 1.142
+++ malware-mobiles.de.po 14 Nov 2020 09:32:59 -0000 1.143
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -982,6 +982,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a href=\"https://www."
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- malware-mobiles.es.po 10 Nov 2020 17:37:40 -0000 1.197
+++ malware-mobiles.es.po 14 Nov 2020 09:32:59 -0000 1.198
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -816,6 +817,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a href=\"https://www."
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- malware-mobiles.fr.po 10 Nov 2020 17:37:40 -0000 1.211
+++ malware-mobiles.fr.po 14 Nov 2020 09:32:59 -0000 1.212
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -812,6 +813,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a href=\"https://www."
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-mobiles.it-diff.html 10 Nov 2020 17:37:40 -0000 1.91
+++ malware-mobiles.it-diff.html 14 Nov 2020 09:32:59 -0000 1.92
@@ -569,6 +569,15 @@
<h3 id="sabotage">Sabotage</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M201902041">
<p>Twenty nine “beauty camera” apps that used to be
on Google Play had one or more malicious functionalities, such
@@ -1624,7 +1633,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:40 $
+$Date: 2020/11/14 09:32:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-mobiles.it.po 10 Nov 2020 17:37:40 -0000 1.142
+++ malware-mobiles.it.po 14 Nov 2020 09:32:59 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -938,6 +938,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a href=\"https://www."
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- malware-mobiles.ja-diff.html 10 Nov 2020 17:37:40 -0000 1.109
+++ malware-mobiles.ja-diff.html 14 Nov 2020 09:32:59 -0000 1.110
@@ -564,6 +564,15 @@
<h3 id="sabotage">Sabotage</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M201902041">
<p>Twenty nine “beauty camera” apps that used to be
on Google Play had one or more malicious functionalities, such
@@ -1478,7 +1487,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:40 $
+$Date: 2020/11/14 09:32:59 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-mobiles.ja.po 10 Nov 2020 17:37:40 -0000 1.133
+++ malware-mobiles.ja.po 14 Nov 2020 09:32:59 -0000 1.134
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -716,6 +716,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a href=\"https://www."
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-mobiles.pot 10 Nov 2020 17:37:40 -0000 1.108
+++ malware-mobiles.pot 14 Nov 2020 09:32:59 -0000 1.109
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -563,6 +563,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a "
+"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\">lets
"
+"banks and creditors deactivate people's Android devices</a> if they fail to "
+"make payments. If someone's device gets deactivated, it will be limited to "
+"basic functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- malware-mobiles.ru.po 10 Nov 2020 17:37:40 -0000 1.249
+++ malware-mobiles.ru.po 14 Nov 2020 09:32:59 -0000 1.250
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -804,6 +805,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Twenty nine “beauty camera” apps that used to be on Google Play "
"had one or more malicious functionalities, such as stealing users' photos "
"instead of “beautifying” them, <a href=\"https://www."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- nl.po 10 Nov 2020 17:37:40 -0000 1.232
+++ nl.po 14 Nov 2020 09:32:59 -0000 1.233
@@ -4165,6 +4165,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -4942,6 +4951,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -8024,9 +8043,9 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around 4[-0-]{+5+}0 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2019,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around 4[-0-]{+5+}0 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -8034,8 +8053,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
@@ -8394,29 +8413,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -9279,6 +9275,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -9778,6 +9797,20 @@
#, fuzzy
#~| msgid ""
+#~| "As of April, 2019, the files in this directory list around 400 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
+#, fuzzy
+#~| msgid ""
#~| "<a href=\"http://motherboard.vice.com/read/switzerland-wants-a-single-"
#~| "universal-phone-charger-by-2017\"> Apple uses DRM software to prevent "
#~| "people from charging an iThing with a generic USB cable</a>."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- pl.po 10 Nov 2020 17:37:40 -0000 1.231
+++ pl.po 14 Nov 2020 09:32:59 -0000 1.232
@@ -3689,6 +3689,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -4422,6 +4431,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -7480,8 +7499,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -7897,29 +7916,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8765,6 +8761,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- pot 10 Nov 2020 17:37:40 -0000 1.230
+++ pot 14 Nov 2020 09:32:59 -0000 1.231
@@ -3448,6 +3448,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -4154,6 +4163,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -7017,8 +7036,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -7207,29 +7226,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#
#
#
@@ -7988,6 +7984,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-back-doors.de-diff.html 10 Nov 2020 17:37:41 -0000 1.48
+++ proprietary-back-doors.de-diff.html 14 Nov 2020 09:32:59 -0000 1.49
@@ -365,7 +365,7 @@
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on</em></ins></span> the <span
class="removed"><del><strong>article for the facts</strong></del></span> <span
class="inserted"><ins><em>user's computer</a>. The app developers
regularly used</em></ins></span> it <span
class="removed"><del><strong>presents. It is too bad
- that</strong></del></span> <span class="inserted"><ins><em>to
make</em></ins></span> the <span class="removed"><del><strong>article finishes
by advocating</strong></del></span> <span class="inserted"><ins><em>computer
download and execute any code
+ that</strong></del></span> <span class="inserted"><ins><em>to
make</em></ins></span> the <span class="removed"><del><strong>article finishes
by</strong></del></span> <span class="inserted"><ins><em>computer download and
execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
@@ -428,7 +428,7 @@
load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating</em></ins></span> the
+ is too bad that the article finishes by</em></ins></span> advocating the
moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
@@ -455,7 +455,7 @@
door</a>, Windows 8</em></ins></span> has a back door <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>for <a
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely <span class="removed"><del><strong>delete apps.</a> (It
was in a
- program called</strong></del></span> <span
class="inserted"><ins><em>deleting apps</a>.</p>
+ program called GTalkService,</strong></del></span> <span
class="inserted"><ins><em>deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
@@ -468,7 +468,7 @@
<p>In Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
Google has a back door to remotely delete apps</a>. (It was in a
- program called</em></ins></span> GTalkService, which seems since then to
have been
+ program called GTalkService,</em></ins></span> which seems since then to
have been
merged into Google Play.)</p>
<p>Google can also <a
@@ -511,6 +511,15 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M202007010">
<p>BMW will remotely <a
href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
@@ -953,7 +962,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:41 $
+$Date: 2020/11/14 09:32:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-back-doors.de.po 10 Nov 2020 17:37:41 -0000 1.145
+++ proprietary-back-doors.de.po 14 Nov 2020 09:32:59 -0000 1.146
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -867,6 +867,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
"as-a-platform/\"> enable and disable functionality in cars</a> through a "
"universal back door."
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-back-doors.es.po 10 Nov 2020 17:37:41 -0000 1.47
+++ proprietary-back-doors.es.po 14 Nov 2020 09:33:00 -0000 1.48
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-10-18 11:12+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -721,6 +722,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
"as-a-platform/\"> enable and disable functionality in cars</a> through a "
"universal back door."
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary-back-doors.fr.po 10 Nov 2020 17:37:41 -0000 1.169
+++ proprietary-back-doors.fr.po 14 Nov 2020 09:33:00 -0000 1.170
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -726,6 +727,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
"as-a-platform/\"> enable and disable functionality in cars</a> through a "
"universal back door."
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-back-doors.it-diff.html 10 Nov 2020 17:37:41 -0000 1.74
+++ proprietary-back-doors.it-diff.html 14 Nov 2020 09:33:00 -0000 1.75
@@ -519,8 +519,8 @@
please don't smear sharing.</li>
<li><p>The idea</em></ins></span> of <span
class="removed"><del><strong>this power has not been
-malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP”</em></ins></span> is
- <span class="inserted"><ins><em>total confusion. The term “IP”
itself is a <a
+malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP” is
+ total confusion. The term “IP” itself</em></ins></span> is
<span class="inserted"><ins><em>a <a
href="/philosophy/not-ipr.html">bogus generalization about
things</em></ins></span>
that <span class="removed"><del><strong>nobody
should</strong></del></span> have <span class="removed"><del><strong>such power,
which could also be used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em>nothing in
common</a>.</p>
@@ -606,6 +606,15 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M202007010">
<p>BMW will remotely <a
href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
@@ -1014,7 +1023,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:41 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary-back-doors.it.po 10 Nov 2020 17:37:41 -0000 1.137
+++ proprietary-back-doors.it.po 14 Nov 2020 09:33:00 -0000 1.138
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -871,6 +871,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
"as-a-platform/\"> enable and disable functionality in cars</a> through a "
"universal back door."
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-back-doors.ja-diff.html 10 Nov 2020 17:37:41 -0000 1.75
+++ proprietary-back-doors.ja-diff.html 14 Nov 2020 09:33:00 -0000 1.76
@@ -561,6 +561,15 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M202007010">
<p>BMW will remotely <a
href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
@@ -972,7 +981,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:41 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary-back-doors.ja.po 10 Nov 2020 17:37:41 -0000 1.121
+++ proprietary-back-doors.ja.po 14 Nov 2020 09:33:00 -0000 1.122
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -678,6 +678,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
"as-a-platform/\"> enable and disable functionality in cars</a> through a "
"universal back door."
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-back-doors.pot 10 Nov 2020 17:37:41 -0000 1.86
+++ proprietary-back-doors.pot 14 Nov 2020 09:33:00 -0000 1.87
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -505,6 +505,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a "
+"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\">lets
"
+"banks and creditors deactivate people's Android devices</a> if they fail to "
+"make payments. If someone's device gets deactivated, it will be limited to "
+"basic functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a "
"href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/\"> "
"enable and disable functionality in cars</a> through a universal back door."
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary-back-doors.ru.po 10 Nov 2020 17:37:41 -0000 1.213
+++ proprietary-back-doors.ru.po 14 Nov 2020 09:33:00 -0000 1.214
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 17:25+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -712,6 +713,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-vehicle-"
"as-a-platform/\"> enable and disable functionality in cars</a> through a "
"universal back door."
Index: proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-sabotage.de-diff.html 10 Nov 2020 17:37:42 -0000 1.61
+++ proprietary-sabotage.de-diff.html 14 Nov 2020 09:33:00 -0000 1.62
@@ -83,6 +83,15 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M202008182">
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
@@ -897,7 +906,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:42 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary-sabotage.de.po 10 Nov 2020 17:37:43 -0000 1.143
+++ proprietary-sabotage.de.po 14 Nov 2020 09:33:00 -0000 1.144
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -155,6 +155,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
"facebook-login-change-separate-account-support-end-quest-october\">require "
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-sabotage.es.po 10 Nov 2020 17:37:43 -0000 1.47
+++ proprietary-sabotage.es.po 14 Nov 2020 09:33:00 -0000 1.48
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-08 11:15+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -107,6 +108,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
"facebook-login-change-separate-account-support-end-quest-october\">require "
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary-sabotage.fr.po 10 Nov 2020 17:37:43 -0000 1.194
+++ proprietary-sabotage.fr.po 14 Nov 2020 09:33:00 -0000 1.195
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-07 13:25+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -105,6 +106,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
"facebook-login-change-separate-account-support-end-quest-october\">require "
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-sabotage.it-diff.html 10 Nov 2020 17:37:43 -0000 1.71
+++ proprietary-sabotage.it-diff.html 14 Nov 2020 09:33:00 -0000 1.72
@@ -75,19 +75,36 @@
</blockquote>
<div class="important">
-<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary software</strong></del></span> <span
class="inserted"><ins><em>an example</em></ins></span> that <span
class="inserted"><ins><em>ought to be in this page but isn't
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>proprietary software</strong></del></span> <span
class="inserted"><ins><em>an example</em></ins></span> that <span
class="removed"><del><strong>has something
+worse than</strong></del></span> <span class="inserted"><ins><em>ought to be
in this page but isn't
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>back door.</p>
+
+<ul>
+ <li>
+ <p>Apple</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated,
it</em></ins></span> will <span
class="removed"><del><strong>stop</strong></del></span>
+ <span class="inserted"><ins><em>be limited to basic functionality, such as
emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M202008182">
- <p>Oculus headsets <a
-
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
+ model iThings</a>.</p>
+
+ <p>Meanwhile, Apple stops people</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
</li>
@@ -96,8 +113,9 @@
<p>The Mellow sous-vide cooker is
tethered to a server. The company suddenly <a
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/">
- turned this tethering into a subscription</a>, forbidding users from
- taking advantage of the “advanced features” of the cooker
+ turned this tethering into a subscription</a>, forbidding
users</em></ins></span> from <span class="removed"><del><strong>fixing problems
themselves;
+ that's</strong></del></span>
+ <span class="inserted"><ins><em>taking advantage of</em></ins></span> the
<span class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>“advanced features”</em></ins></span> of
<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>the cooker
unless they pay a monthly fee.</p>
</li>
@@ -108,12 +126,13 @@
snooping and sabotage capabilities</a> if they install their own
software on the device. Many employers demand to do this. For the
employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ and as dangerous as any other nonfree</em></ins></span> software.</p>
</li>
- <li id="M201910071">
- <p>Adobe</em></ins></span> has <span
class="removed"><del><strong>something
-worse</strong></del></span> <span class="inserted"><ins><em><a
+ <span class="removed"><del><strong><li><p>
Microsoft</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910071">
+ <p>Adobe has <a
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/">
cancelled the software subscriptions of all users in
Venezuela</a>. This demonstrates how a requirement for subscription
can be
@@ -123,29 +142,21 @@
<li id="M201909160">
<p>Tesla users claim Tesla <a
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW">force-installed
- software to cut down on battery range</a>, rather</em></ins></span>
than <span class="inserted"><ins><em>replace the
+ software to cut down on battery range</a>, rather than replace the
defective batteries. Tesla did this to avoid having to run their
warranty.</p>
- <p>This means that proprietary software can potentially
be</em></ins></span> a <span class="removed"><del><strong>back door.</p>
-
-<ul>
- <li>
- <p>Apple will stop</strong></del></span> <span
class="inserted"><ins><em>way to
+ <p>This means that proprietary software can potentially be a way to
commit perjury with impunity.</p>
</li>
<li id="M201908130">
<p>When Apple suspects a user of fraud, it
judges the case secretly and presents the verdict
- as a fait accompli. The punishment to a user found
guilty</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
- being cut off</em></ins></span> for <span
class="removed"><del><strong>older
- model iThings</a>.</p>
-
- <p>Meanwhile,</strong></del></span> <span
class="inserted"><ins><em>life, which more-or-less cripples the
user's</em></ins></span> Apple <span class="removed"><del><strong>stops people
from fixing problems themselves;
- that's</strong></del></span>
- <span class="inserted"><ins><em>devices forever</a>. There is no
appeal.</p>
+ as a fait accompli. The punishment to a user found guilty <a
+
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
+ being cut off for life, which more-or-less cripples the user's Apple
+ devices forever</a>. There is no appeal.</p>
</li>
<li id="M201904041">
@@ -156,9 +167,9 @@
versions of Windows 10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909">
tampering with users' settings and files</a>, notably to
- “repair” any components of</em></ins></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>updating system that users
+ “repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
- them. Microsoft repeatedly pushed faulty versions</em></ins></span> of
<span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>this program to
+ them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/">
critical</a>.</p>
@@ -329,12 +340,10 @@
bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of proprietary</em></ins></span> software.</p>
+ that's the nature of proprietary software.</p>
</li>
- <span class="removed"><del><strong><li><p>
Microsoft</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705180">
+ <li id="M201705180">
<p>Bird and rabbit pets were implemented for Second
Life by a company that tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
@@ -874,7 +883,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:43 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-sabotage.it.po 10 Nov 2020 17:37:43 -0000 1.136
+++ proprietary-sabotage.it.po 14 Nov 2020 09:33:00 -0000 1.137
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -145,6 +145,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
"facebook-login-change-separate-account-support-end-quest-october\">require "
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary-sabotage.ja-diff.html 10 Nov 2020 17:37:43 -0000 1.77
+++ proprietary-sabotage.ja-diff.html 14 Nov 2020 09:33:00 -0000 1.78
@@ -84,6 +84,15 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
<li id="M202008182">
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
@@ -852,7 +861,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:43 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary-sabotage.ja.po 10 Nov 2020 17:37:43 -0000 1.130
+++ proprietary-sabotage.ja.po 14 Nov 2020 09:33:00 -0000 1.131
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -121,6 +121,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
"facebook-login-change-separate-account-support-end-quest-october\">require "
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-sabotage.pot 10 Nov 2020 17:37:43 -0000 1.94
+++ proprietary-sabotage.pot 14 Nov 2020 09:33:00 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -86,6 +86,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a "
+"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\">lets
"
+"banks and creditors deactivate people's Android devices</a> if they fail to "
+"make payments. If someone's device gets deactivated, it will be limited to "
+"basic functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a "
"href=\"https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october\">require
"
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary-sabotage.ru.po 10 Nov 2020 17:37:43 -0000 1.228
+++ proprietary-sabotage.ru.po 14 Nov 2020 09:33:00 -0000 1.229
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -104,6 +105,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Oculus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/oculus-"
"facebook-login-change-separate-account-support-end-quest-october\">require "
"users to identify themselves to Facebook</a>. This will give Facebook free "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary-surveillance.de-diff.html 10 Nov 2020 17:37:43 -0000
1.138
+++ proprietary-surveillance.de-diff.html 14 Nov 2020 09:33:00 -0000
1.139
@@ -623,21 +623,51 @@
</li>
<li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
+ users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
+ <span class="removed"><del><strong>do.</p>
+
+ <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>can't
“fool”</em></ins></span>
+ the
+ <span class="removed"><del><strong>source code
somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According to Edward Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
- retrieve geo-location data from the GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed to disguise itself
+ them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to the
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p>
+</li>
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>security
+ of 283 Android VPN apps concluded that “in spite of the
+ promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span>
+ <span class="inserted"><ins><em>read</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -645,20 +675,30 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
+ Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
+ VPN apps.”</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
+ the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
+ detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>users cannot
stop
+ them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
+ to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -672,25 +712,51 @@
<li id="M202009183">
<p>Facebook <a
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning on the device's
+ on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the
<span class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full
access</strong></del></span> <span class="inserted"><ins><em>device's
camera.</p>
</li>
<li id="M202004200">
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating the Siri software to <a
+ made a practice of surreptitiously activating the Siri
software</em></ins></span> to <span class="inserted"><ins><em><a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations when they had not activated Siri</a>.
+ record</em></ins></span> users' <span class="removed"><del><strong>text
messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>conversations
when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was to listen to these recordings, in a group that made
+ <p>His job was</em></ins></span> to <span
class="removed"><del><strong>read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> to <span
class="removed"><del><strong>LinkedIn. Also, it stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em>these recordings, in a group that made
transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable way to prevent this is, for the program that
- controls access to the microphone to decide when the user has
- “activated” any service, to be free software, and the
- operating system under it free as well. This way, users could make
+ <p>The only reliable way</em></ins></span> to <span
class="inserted"><ins><em>prevent this is, for</em></ins></span> the <span
class="removed"><del><strong>UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>program that
+ controls access</em></ins></span> to the
+ <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>microphone to decide
when</em></ins></span> the <span class="removed"><del><strong>JS injection
is</strong></del></span> <span class="inserted"><ins><em>user has
+ “activated” any service,</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>be free
software, and</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed</strong></del></span>
+ <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
sure Apple can't listen to them.</p>
</li>
@@ -698,212 +764,344 @@
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
+ Browsing service</a>, to check URLs</em></ins></span> that <span
class="inserted"><ins><em>possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
- contains the websites of political opponents. By linking the requests
+ with</em></ins></span> the <span class="removed"><del><strong>non-premium
version</strong></del></span> <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list most certainly
+ contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
+ <span class="inserted"><ins><em><li id="M201905280">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
+ proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information to third
parties</a>.</p></em></ins></span>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
+ and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
+ trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
+ delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
+ used for.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
- <li id="M201709210">
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
+ no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p></em></ins></span>
</li>
- <li id="M201609280">
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
- and videos they make.</p>
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>Conditions” that spell out
+what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>make.</p>
+
+ <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>honestly
identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>video you
+ take,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
+place!</p>
+</li>
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
+ <span class="removed"><del><strong>yet another
example</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
don't ask where.”</p>
- <p>There is a way to
- <a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so it still counts as a
- surveillance functionality.</p>
+ <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
+ unthinkable with free software.</p>
- <p>Unknown people apparently took advantage of this to <a
-
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ </li>
+
+ <li><p>More than 73%</strong></del></span>
+ <span class="inserted"><ins><em>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>break Apple's
+ security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+
+ <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
- <p>This may have improved with <a
+ <p>This may</em></ins></span> have <span
class="removed"><del><strong>described these apps as
+ “free”—they are</strong></del></span> <span
class="inserted"><ins><em>improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
+ not <span class="removed"><del><strong>free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple
claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
+ for <span class="removed"><del><strong>granted that</strong></del></span>
<span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not</strong></del></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect to 100</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
+ <span class="inserted"><ins><em>get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
+ Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
+ turned off.</p></em></ins></span>
</li>
- <li id="M201210170">
- <p>There is also a feature for web sites to track users, which is
<a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201210170">
+ <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p>
+ still true in iOS 7.)</p></em></ins></span>
</li>
- <li id="M201204280">
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201204280">
<p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
- to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p>
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
+ to <span class="removed"><del><strong>any file on</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving a valid
+ email address and receiving</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
+ to it.</p></em></ins></span>
</li>
</ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 id="SpywareInAndroid">Android Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
+ <p>Xiaomi phones</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li><p>In</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth the
+ obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>user takes</a>: starting an app, looking
at a folder,
+ visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>be spied on”.</p>
+ </li>
+
+ <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>a song. They send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
+ other streaming dis-services make a dossier about each user,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make
+ users identify themselves</em></ins></span> to <span
class="removed"><del><strong>use it without having your fingerprints
+ taken. Users would have</strong></del></span> <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
<p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
+ but we condemn this</em></ins></span> no <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent” to <a
-
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>tell whether the phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>there.</p></strong></del></span> <span
class="inserted"><ins><em>Android phones</a> while disguising
+ what the “consent” was for.</p></em></ins></span>
</li>
- <li id="M201811230">
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811230">
+ <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>location
data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
+ it saved up</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
</li>
- <li id="M201711210">
- <p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711210">
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></em></ins></span>
+ even <span class="removed"><del><strong>gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>when “location services” are turned
off, even when</em></ins></span>
+ the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ sold with spyware sending lots of data</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
- <li id="M201609140">
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609140">
+ <p>Google Play (a component</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS apps</strong></del></span>
<span class="inserted"><ins><em>Android)</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
+ <p>Even if you disable Google Maps</em></ins></span> and location
<span class="removed"><del><strong>information</a></strong></del></span>
<span class="inserted"><ins><em>tracking, you must
disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ yet another example</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
@@ -911,89 +1109,160 @@
<li id="M201507030">
<p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ that users can't delete</a>,</em></ins></span> and
+ <span class="removed"><del><strong>videos</strong></del></span> they
<span class="removed"><del><strong>make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>send so much data
that their
+ transmission</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
+ not wanted or requested</em></ins></span> by the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+ of <span class="removed"><del><strong>iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>some kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active</strong></del></span> <span
class="inserted"><ins><em>any file on the system.</p>
</li>
<li id="M201308010">
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a> (presumably Windows laptops). Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ Journal (in an article blocked from us</em></ins></span> by <span
class="removed"><del><strong>default so it still counts
as</strong></del></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</em></ins></span> can <span class="removed"><del><strong>access
any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>remotely activate</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span class="inserted"><ins><em>GPS</em></ins></span>
and <span class="removed"><del><strong>get other info too.</p>
+ </li>
+
+ <li><p>There is also a feature for web sites to track users,
which</strong></del></span> <span class="inserted"><ins><em>microphone in
Android phones
+ and laptops</a> (presumably Windows laptops).
Here</em></ins></span> is <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
- <p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>still true</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a></strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
+ sold. Some Motorola phones, made when this company was
owned</em></ins></span>
+ by <span class="removed"><del><strong>default,
though</strong></del></span> <span class="inserted"><ins><em>Google, use a
modified version of Android</em></ins></span> that <span
class="removed"><del><strong>can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
</li>
<li id="M201307250">
<p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens</em></ins></span> for <span class="inserted"><ins><em>voice
all</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150">
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>personal details of
users that install</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>totally
incompetent.</a></p>
+ </li>
- <p>Merely asking the “consent” of users is not enough to
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>not enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ honestly identify the information it collects on users,
instead</em></ins></span> of <span class="removed"><del><strong>iOS
seem</strong></del></span>
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ and</em></ins></span> other <span class="removed"><del><strong>than
surveillance</a>. Here is</strong></del></span> <span
class="inserted"><ins><em>companies from getting this personal information
in</em></ins></span> the
+ <span class="inserted"><ins><em>first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li id="M201410080">
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201410080">
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send</em></ins></span> lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ needed</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even</em></ins></span> which <span
class="removed"><del><strong>enable them to turn</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>user reads at
what time</a>.</p>
</li>
</ul>
@@ -1012,122 +1281,243 @@
<ul class="blurbs">
<li id="M201912190">
- <p>Some Avast and AVG extensions
- for Firefox and Chrome were found to <a
+ <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from the
+ GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>AVG extensions
+ for Firefox</em></ins></span> and <span
class="removed"><del><strong>web</strong></del></span> <span
class="inserted"><ins><em>Chrome were found to <a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>. Mozilla and Google
- removed the problematic extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that are supposed
- to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being the original
malware).</p>
+ snoop on users' detailed</em></ins></span> browsing <span
class="removed"><del><strong>history,</strong></del></span> <span
class="inserted"><ins><em>habits</a>. Mozilla</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>Google
+ removed</em></ins></span> the <span class="removed"><del><strong>contact
list. This malware is designed</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
+ once more how unsafe nonfree software can be. Tools that are
supposed</em></ins></span>
+ to
+ <span class="removed"><del><strong>disguise</strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
+ additional malware (the system</em></ins></span> itself <span
class="removed"><del><strong>from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>being the original
malware).</p></em></ins></span>
</li>
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811020">
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used for repression of forbidden sharing
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>users can't delete</a>,
+ and they send so much data</strong></del></span> <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="inserted"><ins><em>not</em></ins></span> a
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
+ </li>
+
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The</strong></del></span> nonfree <span
class="removed"><del><strong>Snapchat app's principal purpose is to restrict
+ the use of data on</strong></del></span> <span
class="inserted"><ins><em>software. It may avoid
+ paying for</em></ins></span> the <span class="removed"><del><strong>user's
computer,</strong></del></span> <span class="inserted"><ins><em>nasty
thing,</em></ins></span> but <span class="inserted"><ins><em>cannot
make</em></ins></span> it <span class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<ul class="blurbs">
- <li id="M202003010">
- <p>The Alipay Health Code app
- estimates whether the user has Covid-19 and <a
-
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells the cops directly</a>.</p>
- </li>
-
- <li id="M202001290">
- <p>The Amazon Ring app does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for Amazon</a>.</p>
- </li>
-
- <li id="M201912220">
- <p>The ToToc messaging app seems to be a <a
-
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202003010"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Alipay Health Code</em></ins></span> app
+ <span class="inserted"><ins><em>estimates whether the user has
Covid-19</em></ins></span> and <span class="removed"><del><strong>dis-service
spy on users even more than users
+ expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202001290">
+ <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The
Sarahah</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912220">
+ <p>The ToToc messaging</em></ins></span> app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and that is a good
+ Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
+ book to developer's server. Note</strong></del></span> that <span
class="inserted"><ins><em>is a good
reason to use free software instead.</p>
- <p><small>Note: this article uses the word “free”
in
- the sense of “gratis.”</small></p>
+ <p><small>Note:</em></ins></span> this article <span
class="removed"><del><strong>misuses</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
+ </li>
+
+ <li>
+ <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>word “free” in</em></ins></span>
+ the <span class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening to or watching</a>. In addition, it may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
</li>
- <li id="M201912090">
+ <li>
+ <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912090">
<p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
+ software</em></ins></span> on <span class="removed"><del><strong>some of
its phones. The app will give Verizon</strong></del></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand to do this.
For</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span>
+ <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
and as dangerous as any other nonfree software.</p>
</li>
<li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="inserted"><ins><em>Great Nation”</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
+ internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>Android version was found to contain a
+ back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="inserted"><ins><em>users'
+ phone, as “superusers.” Downloading and using
this</em></ins></span>
+ app <span class="removed"><del><strong>remains spyware—an
“optional” piece of spyware</strong></del></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app</strong></del></span> <span class="inserted"><ins><em>mandatory at some
workplaces.</p>
+
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
+ readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes
a clarification
+ saying that the tests were</em></ins></span> only
+ <span class="removed"><del><strong>can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>performed</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>the Android version</em></ins></span>
+ of <span class="removed"><del><strong>data in</strong></del></span> the
<span class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
<li id="M201909091">
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
+ <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>,</em></ins></span> after
<span class="inserted"><ins><em>tricking them
+ into giving</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
</li>
- <li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to Facebook</a>.</p>
+ <li><p>Google's new voice messaging</strong></del></span> app
<span class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>broad permissions in order to use one of its
+ functionalities.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.</p>
+ </li>
+
+ <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>Maya</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take
according</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201909060">
- <p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There is a
+ <p>Keeping track of</em></ins></span> who <span
class="inserted"><ins><em>downloads a proprietary
+ program</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of all the 10,000 or more people
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>list of all</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not be a list of who has installed
+ <p>With a free program there would not</em></ins></span> be
+ <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has
installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways to <a
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system, in order to gather as much private data as
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
+ of <span class="removed"><del><strong>Facebook users' pictures
are</strong></del></span> <span class="inserted"><ins><em>the operating system,
in order to gather as much</em></ins></span> private
+ <span class="removed"><del><strong>anymore,</strong></del></span> <span
class="inserted"><ins><em>data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
@@ -1136,51 +1526,112 @@
<li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says <a
+ users' movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
+ exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905300">
+ <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>secretly a</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
+ <p>It snoops on users, too,</em></ins></span> as <span
class="inserted"><ins><em>you must expect from nonfree
programs.</p>
</li>
<li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
+ <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em><a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
+ requirement</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many</strong></del></span> proprietary <span
class="removed"><del><strong>apps for mobile devices report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>phone
app</a> to be allowed into</em></ins></span>
+ the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>event.</p>
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
+ sensitive data, including user's location</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
</li>
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list,
and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904131">
+ <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
+ available</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
+ <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>women's
rights</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>equal employment
+ and freedom</em></ins></span> to <span class="removed"><del><strong>the
app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>make their own pregnancy choices. Don't use
+ these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
+ <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span> <span class="inserted"><ins><em>that does
more or less</em></ins></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
+ </li>
+
+ <li>
+ <p>The “smart” toys My Friend
Cayla</strong></del></span> <span class="inserted"><ins><em>same thing without
spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p>
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>i-Que transmit</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
+ a <span class="removed"><del><strong>speech recognition company
based</strong></del></span> <span class="inserted"><ins><em>new one is being
developed</a>.</p>
</li>
<li id="M201904130">
@@ -1189,60 +1640,106 @@
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software</em></ins></span> in the <span
class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible for
sending</em></ins></span>
+ the <span class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
+ <p>Many Android phones come</em></ins></span> with a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
users' knowledge</a>. These hidden apps may either call home with
the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ the network but no direct access to the data. This
results</em></ins></span> in <span class="inserted"><ins><em>massive
+ surveillance</em></ins></span> on <span class="removed"><del><strong>a
child's speech, and even speak
+ into</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>user has absolutely no
control.</p></em></ins></span>
</li>
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903201"></em></ins></span>
+ <p>A <span class="removed"><del><strong>computerized vibrator
+ <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>19</em></ins></span> of <span
class="inserted"><ins><em>them <a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+ send sensitive</em></ins></span> personal <span
class="removed"><del><strong>information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing
the</strong></del></span> data <span class="removed"><del><strong>may be
+ true, but</strong></del></span> <span class="inserted"><ins><em>to third
parties</a>, which can use</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
+ <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
+ <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="removed"><del><strong>had sold the data</strong></del></span>
<span class="inserted"><ins><em>is buried in
lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ “consent” is not sufficient</em></ins></span> to <span
class="inserted"><ins><em>legitimize snooping.</p>
</li>
<li id="M201902230">
- <p>Facebook offered a convenient proprietary
+ <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
+ sent personal</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to Facebook</a>. Lots of companies built apps
that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="inserted"><ins><em>personal</em></ins></span>
+ data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>they collected</em></ins></span> would <span
class="removed"><del><strong>have been able to figure out
+ who the user was.</p>
- <p>It shows that no one can trust a nonfree program, not even the
- developers</em></ins></span> of <span class="removed"><del><strong>these
apps.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
- <p>On the</strong></del></span> other <span
class="removed"><del><strong>hand,</strong></del></span> <span
class="inserted"><ins><em>nonfree programs.</p>
+ <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even the
+ developers</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
</li>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that</em></ins></span> Google <span
class="removed"><del><strong>redistributes</strong></del></span> <span
class="inserted"><ins><em>wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>take action. This proves
that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
@@ -1255,52 +1752,110 @@
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>“Smart” Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li>
+ <p>An LG “smart” watch is designed</strong></del></span>
<span class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ pushing unwanted and often malicious ads on users,</em></ins></span> and
<span class="inserted"><ins><em>redirecting
+ them</em></ins></span> to <span class="removed"><del><strong>transmit
+ conversations too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
<span class="inserted"><ins><em>phishing sites</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>stole their credentials. Furthermore,
+ the user interface of most of them was designed</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from</em></ins></span> nonfree
<span class="removed"><del><strong>Android apps, and
- therefore shares</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> in <span
class="removed"><del><strong>the responsibility for the
injustice</strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
+ haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
+ <p>The article says this is</strong></del></span>
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>back door,
but</strong></del></span> <span class="inserted"><ins><em>potential risk because
there is no easy way of knowing what they really do.</p>
</li>
<li id="M201902010">
- <p>An investigation</em></ins></span> of <span
class="inserted"><ins><em>the 150 most popular
- gratis VPN apps in Google Play found that <a
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found</em></ins></span> that <span
class="inserted"><ins><em><a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect</em></ins></span> their
- <span class="removed"><del><strong>being nonfree. It</strong></del></span>
<span class="inserted"><ins><em>usersâ privacy</a> due to DNS leaks. In
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially</em></ins></span> also <span
class="removed"><del><strong>distributes its own nonfree apps,
such</strong></del></span> <span class="inserted"><ins><em>be used to spy on
users. Other technical flaws were
- found</em></ins></span> as <span class="inserted"><ins><em>well.</p>
+ source code—often used for invasive
advertising—that</em></ins></span> could
+ <span class="inserted"><ins><em>potentially also</em></ins></span> be
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
+ found as well.</p>
- <p>Moreover, a previous investigation had found that <a
+ <p>Moreover,</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However,
it</strong></del></span> <span class="inserted"><ins><em>previous investigation
had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p><small>(It is unfortunate that these articles talk about
“free
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>certainly surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.)</small></p>
+ href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201901050">
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the company's
server</a>. The company is
+ being sued, demanding</em></ins></span> that <span
class="inserted"><ins><em>it notify</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>users
of what it will do
with the data.</p>
- <p>We think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ <p>We think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>side issue. What
the company does
+ with the data</em></ins></span> is <span class="removed"><del><strong>not
really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>a secondary issue. The principal wrong here is that
+ the company gets that data</em></ins></span> at <span
class="removed"><del><strong>Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span
class="inserted"><ins><em>all.</p>
<p><a
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1309,37 +1864,62 @@
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span class="removed"><del><strong>emails
of members of Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
+ <p>Often</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>send the machine's “advertising ID,” so
that
+ Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ account.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted
them</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201808030">
- <p>Some</em></ins></span> Google
- <span class="removed"><del><strong>Play,</strong></del></span> <span
class="inserted"><ins><em>apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> <span
class="inserted"><ins><em>Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>other ways to turn off the other
kinds</em></ins></span> of <span class="removed"><del><strong>preventing apps
from
- cheating? There</strong></del></span> <span
class="inserted"><ins><em>location
+ <p>There are other ways to turn off the other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
@@ -1350,98 +1930,56 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect it implements DRM, too—that
there</em></ins></span> is no <span
class="removed"><del><strong>systematic</strong></del></span> way <span
class="removed"><del><strong>for Google, or Android
- users, to inspect executable proprietary apps</strong></del></span> to
<span class="removed"><del><strong>see what they
- do.</p>
-
- <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>save
- a recording. But we can't be sure from</em></ins></span> the
- <span class="removed"><del><strong>source code
somehow</strong></del></span> <span class="inserted"><ins><em>article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat
users</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in
- <span class="removed"><del><strong>various</strong></del></span>
- <span class="inserted"><ins><em>many</em></ins></span> ways. <span
class="removed"><del><strong>If it did a good job</strong></del></span> <span
class="inserted"><ins><em>This is one more.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>this, it could more or less
- prevent such snooping, except when</strong></del></span> the <span
class="removed"><del><strong>app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>protect us.
We must demand release</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these proprietary apps
whose</em></ins></span>
- source code <span class="removed"><del><strong>to the
- public, so we can depend on each other.</p>
-</li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN</strong></del></span> <span
class="inserted"><ins><em>they cannot look at. The other</em></ins></span>
apps <span class="removed"><del><strong>concluded</strong></del></span> <span
class="inserted"><ins><em>might be snooping
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This is evidence</em></ins></span> that <span
class="removed"><del><strong>“in spite of the
- promises for privacy, security, and anonymity given by the
- majority of VPN apps—millions of</strong></del></span> <span
class="inserted"><ins><em>proprietary apps generally work against
- their users. To protect their privacy and freedom,
Android</em></ins></span> users <span class="removed"><del><strong>may be
unawarely subject</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>poor security guarantees and abusive practices
inflicted by
- VPN apps.”</p>
-
- <p>Following is a non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>get rid</em></ins></span> of <span
class="inserted"><ins><em>the</em></ins></span> proprietary <span
class="removed"><del><strong>VPN</strong></del></span> <span
class="inserted"><ins><em>software—both proprietary
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting</em></ins></span> apps from the <span
class="removed"><del><strong>research paper</strong></del></span> <span
class="inserted"><ins><em>free software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>privacy of
- users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p>
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the
information</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that</em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>communicate such info to each
- other but not to</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code></strong></del></span>
<span class="inserted"><ins><em>server's database.</p>
+ It could be designed so that users communicate such info
to</em></ins></span> each <span class="removed"><del><strong>subsection
--></strong></del></span>
+ <span class="inserted"><ins><em>other but not to the server's
database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong><code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to
- users' text messages.</dd>
-
- <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>dis-service
+ <p>The moviepass app and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>after
going</em></ins></span> to <span class="removed"><del><strong>read logs
- for other</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android</em></ins></span> apps
- <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1451,7 +1989,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span class="removed"><del><strong>LinkedIn.
Also, it stores detailed logs</strong></del></span> <span
class="inserted"><ins><em>developer's server.</p>
+ book to developer's server.</p>
<p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
@@ -1461,66 +1999,38 @@
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="removed"><del><strong>may
turn</strong></del></span> <span
class="inserted"><ins><em>sent</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>and text messages and emails</em></ins></span> to
<span class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
- worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
-
- <p>On</em></ins></span> the <span class="removed"><del><strong>JS
injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
+ for the snooping of these apps.</p>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google</em></ins></span> have
- <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+ <p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app does
- JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A</strong></del></span>
study
- <span class="inserted"><ins><em>the source code somehow to determine
whether they mistreat users</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or
less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>app developers are
clever
- enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>paid proprietary</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
-
- <p>But since Google itself develops malicious</em></ins></span>
apps, <span class="removed"><del><strong>it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>we cannot
trust
- Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>source
code to</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705230"></em></ins></span>
- <p>Apps for BART <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on users</a>.</p>
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1528,110 +2038,60 @@
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
+ <li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
- </p></strong></del></span>
- <span
class="inserted"><ins><em>programs</a>.</p></em></ins></span>
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704260">
- <p>Faceapp appears to do lots</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>surveillance, judging by <a
+ <li id="M201704260">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="removed"><del><strong>transmit users'</strong></del></span> personal
data <span class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>in the device</a>.</p></em></ins></span>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
- the <span class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app would record</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="inserted"><ins><em>the audio files</em></ins></span> users <span
class="removed"><del><strong>is not enough</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span>
- <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
-
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting</strong></del></span> this <span
class="removed"><del><strong>personal information in the first
-place!</p>
-</li>
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span> <span class="inserted"><ins><em>was done
without</em></ins></span> the users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>consent.
- If</em></ins></span> the <span class="removed"><del><strong>tracking.
This is
- yet another example of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such a
thing</strong></del></span> <span class="inserted"><ins><em>app said that users
gave consent for this,</em></ins></span>
- would <span class="inserted"><ins><em>that make it acceptable? No way! It
should</em></ins></span> be <span class="removed"><del><strong>almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>flat out <a
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p></em></ins></span>
+ the app to snoop at all</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs</em></ins></span> of <span class="removed"><del><strong>the
most popular</strong></del></span> Android apps <span
class="inserted"><ins><em>can collude
- to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens</em></ins></span> of <span
class="removed"><del><strong>their users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>thousands of pairs that
collude</a>.</p></em></ins></span>
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
+
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to the app's functionality,
- was</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703300">
- <p>Verizon</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software.</strong></del></span>
- <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ <li id="M201703300">
+ <p>Verizon <a
+
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones.</em></ins></span> The <span
class="removed"><del><strong>clear way to say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>app will give Verizon the same information
+ on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
-
- <p>The article</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app</em></ins></span> takes <span
class="removed"><del><strong>for granted that</strong></del></span> <span
class="inserted"><ins><em>effect. However,</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span class="inserted"><ins><em>app
- remains spyware—an “optional” piece of
spyware</em></ins></span> is <span class="removed"><del><strong>that valid?
Software developers have no right</strong></del></span>
- <span class="inserted"><ins><em>still spyware.</p>
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong</strong></del></span> <span class="inserted"><ins><em>a
Chinese company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -1640,375 +2100,193 @@
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate</em></ins></span> as <span
class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span class="inserted"><ins><em>a
protection against
- massive surveillance.</p></em></ins></span>
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201611160">
+ <li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
- 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>concluded that “in spite of the promises
- for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>anonymity given
by</em></ins></span> the <span class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span> <span
class="inserted"><ins><em>majority of VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
- </li>
-
- <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>poor security
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is</em></ins></span> a
- <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+ <p>Following is a non-exhaustive list, taken from the research paper,
of some proprietary VPN apps that track users and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries</em></ins></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>any file
on</strong></del></span> <span class="inserted"><ins><em>track users and show
them targeted ads.</dd>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>system.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full
access</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>users'
+ <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full access to users'
text messages.</dd>
- <dt>DroidVPN</em></ins></span> and <span
class="inserted"><ins><em>TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em><code>READ_LOGS</code> permission
to read logs
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong><a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span> <span class="inserted"><ins><em>stores
detailed logs and
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because this
- would require circumventing</strong></del></span> the <span
class="removed"><del><strong>iOS DRM.</p>
- </li>
-
- <li><p>In</strong></del></span>
- <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span class="removed"><del><strong>latest iThings
system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>JS injection is to display ads. Uses
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
- the
- <span class="removed"><del><strong>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really</strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app</em></ins></span> does
<span class="removed"><del><strong>turn them off—only until 5am.
- That's Apple</strong></del></span> <span
class="inserted"><ins><em>JavaScript injection</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p></strong></del></span>
- <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
- </dl></em></ins></span>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
+ </dl>
</li>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609210">
- <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without
having</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <li id="M201609210">
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
<li id="M201606050">
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans</em></ins></span> your <span
class="removed"><del><strong>fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>mobile phone's photo collections for known
faces</a>,
- and suggests you</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>picture you take according to who</em></ins></span>
is <span class="removed"><del><strong>snooping on
- them.</p></li>
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data</strong></del></span>
- <span class="inserted"><ins><em>in the frame.</p>
-
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>pictures
are likely to be
- sent across</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>Facebook's servers</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>the service.</p></em></ins></span>
+ even if the user didn't “upload” them to the service.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's app listens all</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps</strong></del></span> <span
class="inserted"><ins><em>time,</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them</em></ins></span>
with <span class="removed"><del><strong>third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
- advertisements.</p></em></ins></span>
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604250">
+ <li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in</em></ins></span> the <span
class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span
class="inserted"><ins><em>phone,</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>in server accounts,
- it can alter</em></ins></span> them <span class="removed"><del><strong>up
to date</strong></del></span> <span
class="inserted"><ins><em>too</a>.</p>
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
<li id="M201601130">
<p>Apps that include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>all your devices.
- Any edits you make</strong></del></span> <span
class="inserted"><ins><em>what radio and TV programs</em></ins></span>
- are <span class="removed"><del><strong>automatically updated everywhere.
[...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed</strong></del></span> <span
class="inserted"><ins><em>playing nearby</a>. Also</em></ins></span> on
<span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>what users post on
various sites
- such</em></ins></span> as <span class="removed"><del><strong>a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>Facebook, Google+
and Twitter.</p>
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated</em></ins></span> to <span class="inserted"><ins><em>the app's
functionality, was</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ unrelated to the app's functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>get at them,</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
<p>The article takes for granted that the usual analytics tools are
- legitimate,</em></ins></span> but <span class="removed"><del><strong>NSA
can access</strong></del></span> <span class="inserted"><ins><em>is that valid?
Software developers have no right to
+ legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as</em></ins></span> any <span
class="inserted"><ins><em>other snooping.</p>
+ that snoop are just as wrong as any other snooping.</p>
</li>
<li id="M201510300">
- <p>More than 73% and 47%</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the</strong></del></span> <span class="inserted"><ins><em>mobile
applications, for Android and iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
- personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>location
information</a> of their users with
- third parties.</p></em></ins></span>
+ <p>More than 73% and 47% of mobile applications, for Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
+ third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201508210">
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ <li id="M201508210">
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are
starting
- to realize that</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
+ to realize that it is nasty.</p>
- <p>This article shows the</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</em></ins></span> that <span class="removed"><del><strong>can
be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>they present snooping as a way to “serve”
+ <p>This article shows the <a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>attitude of the proprietary software industry
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506264">
+ <li id="M201506264">
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
- Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>paid
- proprietary apps,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>was only 60%.</p>
+ A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
+ Android apps contained recognizable tracking libraries. For the paid
+ proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span
class="inserted"><ins><em>them are not in fact <a
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span>
- is <span class="removed"><del><strong>the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-<ul>
- <li><p>Tracking software in popular</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li>
-
- <li><p>According</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to turn the phones
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>off, listen to the microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>average.</p>
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
</li>
<li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user</a>.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>in addition</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span>
- <span class="inserted"><ins><em>the snooping done by the phone
company,</em></ins></span> and <span class="removed"><del><strong>they send so
much data that their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested</strong></del></span> <span
class="inserted"><ins><em>perhaps</em></ins></span> by the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>OS in
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>app developers
+ <p>Don't be distracted by the question of whether the app developers
get users to say “I agree”. That is no excuse for
- malware.</p></em></ins></span>
+ malware.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411260">
+ <li id="M201411260">
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by</strong></del></span> a
<span class="removed"><del><strong>paywall)
- reports</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>at least is
visible</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>optional</a>. Not
+ is doing this in a way that at least is visible and optional</a>. Not
as bad as what the others do.</p>
</li>
<li id="M201401150.1">
- <p>The Simeji keyboard</em></ins></span> is <span
class="inserted"><ins><em>a smartphone version of Baidu's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312270">
+ <li id="M201312270">
<p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>the user's
computer, but it does surveillance too:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></em></ins></span>
- it <span class="removed"><del><strong>will eventually require all new
portable phones</strong></del></span> <span
class="inserted"><ins><em>tries</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>get the user's list of other people's phone
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
numbers</a>.</p>
</li>
@@ -2028,11 +2306,9 @@
<li id="M201212100">
<p>FTC says most mobile apps for children don't respect privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2042,14 +2318,11 @@
<ul class="blurbs">
<li id="M201908151">
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>restrict
- the use of data on the user's computer, but</strong></del></span> <span
class="inserted"><ins><em>say whether</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means</em></ins></span> it <span
class="removed"><del><strong>tries to get the user's list of other people's
phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>can do so.</p>
+ <p>That almost certainly means it can do so.</p>
</li>
<li id="M201307110">
@@ -2057,123 +2330,75 @@
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></em></ins></span>
+ specifically for spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app and dis-service spy</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202010221">
<p>Microsoft is imposing its
- surveillance</em></ins></span> on <span class="removed"><del><strong>users
even more than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
- </li>
-
- <li><p>AI-powered driving apps can</strong></del></span> <span
class="inserted"><ins><em>the game of Minecraft by</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
- every <span class="removed"><del><strong>move</a>.</p>
- </li>
-
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span> <span
class="inserted"><ins><em>player to open an account on Microsoft's
network</a>. Microsoft
- has bought the game</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
- book</strong></del></span> <span class="inserted"><ins><em>will merge
all accounts into its network,
- which will give them access</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>people's data.</p>
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>this article misuses</strong></del></span>
<span class="inserted"><ins><em>it is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
- it offers more options.</p></em></ins></span>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Facebook's app listens all the time,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>the recordings</a>.</p>
+ <li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had <a
+
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to the recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p></em></ins></span>
+ having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806240">
+ <li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends</em></ins></span> it <span
class="removed"><del><strong>demands</strong></del></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804144">
+ <li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with</em></ins></span> an <span
class="removed"><del><strong>opt-in proprietary search app that it
will</a>
- pre-install</strong></del></span> <span
class="inserted"><ins><em>update to the massive
+ program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running</em></ins></span> on <span
class="removed"><del><strong>some of</strong></del></span> its <span
class="removed"><del><strong>phones. The app will give Verizon the
same</strong></del></span> <span class="inserted"><ins><em>user's
computer</a>.</p>
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
- information <span class="removed"><del><strong>about the users' searches
that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app is</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
</li>
<li id="M201512290">
- <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>their users</em></ins></span> and <span
class="inserted"><ins><em>report to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of
spyware</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
-
- <p>A game console</em></ins></span> is
- <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>a
computer, and you can't trust a computer with
- a nonfree operating system.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span>
- <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ <p>Many <a
+
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
+ </li>
+
+ <li id="M201509160">
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -2181,59 +2406,36 @@
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this</em></ins></span> data to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em>manipulate people to
buy things, and hunt for
- “whales” who</em></ins></span> can <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>be led
to spend a lot</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> <span class="inserted"><ins><em>money. They also
- use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
+ <p>They use this data to manipulate people to buy things, and hunt
for
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
<li id="M201401280">
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>in server accounts,</strong></del></span> <span
class="inserted"><ins><em>the NSA takes advantage
- to spy through</em></ins></span> it <span class="removed"><del><strong>can
- alter them</strong></del></span> too</a>.
- <span class="removed"><del><strong></p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Here's information on</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging</strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
+ <li id="M200510200">
<p>Blizzard Warden is a hidden
- “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>what users
post</strong></del></span> <span class="inserted"><ins><em>every process
running</em></ins></span> on <span class="removed"><del><strong>various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>sniffs a
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -2245,21 +2447,13 @@
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
- is in</strong></del></span> <span class="inserted"><ins><em>people that
use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p><small>(It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>term <a
+ <p><small>(It is unfortunate that the article uses the term
<a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
@@ -2270,190 +2464,124 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M202006250">
- <p>TV manufacturers</em></ins></span> are <span
class="removed"><del><strong>private
- anymore, even if</strong></del></span> <span
class="inserted"><ins><em>able to <a
+ <p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>is
watching</a>. This is illegal due</em></ins></span> to
- the <span class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015</strong></del></span> <span class="inserted"><ins><em>Video Privacy
Protection Act of 1988, but they're circumventing</em></ins></span>
- it <span class="inserted"><ins><em>through EULAs.</p>
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
</li>
<li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>third
parties. This is in return for
- “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>some
- are starting</strong></del></span> <span
class="inserted"><ins><em>slightly
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable, according to him,
- is</em></ins></span> that it is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span>
- <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the <span
class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>scenes,
- and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>mobile devices
report which other
- apps</strong></del></span> <span class="inserted"><ins><em>that
- matter),</em></ins></span> the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on
you</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
- <span class="inserted"><ins><em>to disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>terrestrial antenna
- instead. Unfortunately, this</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>not always possible. Another option,
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is opt-in in newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software),</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>set up a
- firewall to block connections to Vizio's servers. Or,</em></ins></span> as
<span class="removed"><del><strong>what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>a last
resort,
- you can replace your TV with another model.</p></em></ins></span>
+ be an old computer running completely free software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
+ <li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>the facts it
presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="inserted"><ins><em>them, and not just broadcasts and
- cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>in addition to</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>user's own computer,</em></ins></span>
- the <span class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>TV reports what it is.
The existence of a way to disable</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
- does not legitimize</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
- sounds to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>picked up</em></ins></span> by <span
class="removed"><del><strong>the question of whether the app developers get
- users</strong></del></span> <span class="inserted"><ins><em>proprietary
malware running
- on other devices in range so as</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>determine that they
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>the app developer</strong></del></span> <span
class="inserted"><ins><em>turn this off,</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>having</em></ins></span> it <span
class="inserted"><ins><em>enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>other companies. This
shows</strong></del></span> the
- <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>600 millions social media
profiles</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>company
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>new combined surveillance by default.</p>
+ users to new combined surveillance by default.</p>
</li>
<li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they
wanted</em></ins></span> to <span class="removed"><del><strong>anyone? A free
software flashlight
- app would not.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was found</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
+ <li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to make <span
class="removed"><del><strong><a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its TVs snoop on what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Samsung “Smart” TV</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet</em></ins></span> to <span
class="inserted"><ins><em>another company, Nuance</a>.</em></ins></span>
- Nuance <span class="removed"><del><strong>Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> can <span class="removed"><del><strong>remotely
control the toys with a mobile phone. This</strong></del></span> <span
class="inserted"><ins><em>save it and</em></ins></span> would
- <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>then have to give it</em></ins></span> to <span
class="removed"><del><strong>listen in on a child's speech, and even speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span class="inserted"><ins><em>US
or some
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
@@ -2462,142 +2590,91 @@
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
- parties</a>.</p></em></ins></span>
+ parties</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
- snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ on their users</a>.</p>
- <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span class="removed"><del><strong>data
may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact that the transmission
reports</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data <span
class="removed"><del><strong>broker would have been able to figure out
- who</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
+ product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
+ <li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch is designed</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>someone else and</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>transmit
- conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+ video—Amazon expects society to surrender to.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>look at what's</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
- <p>The article says this is a back door, but</strong></del></span>
<span class="inserted"><ins><em>the videos. That's not
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -2605,188 +2682,114 @@
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs</em></ins></span> that <span
class="removed"><del><strong>could be a
- misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em>allow anyone to watch through
them</a>.</p>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
<li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches</em></ins></span> it <span
class="inserted"><ins><em>“off.”</p>
+ even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>using it
- to outsmart you.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>product
as shipped doesn't act as</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</em></ins></span> its <span
class="removed"><del><strong>own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>statements
about their
+ standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>doesn't really matter. If it had sold the data
to a data
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
the company has been ordered to pay a total of C$4m</a> to its
- customers.</p></em></ins></span>
+ customers.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-<ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
+ conversations was unacceptable by itself.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
+ <li id="M201612060">
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
+ conversations to Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
+ crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>children and adults</a>.</p>
+ going to spy on children and adults</a>.</p>
</li>
</ul></em></ins></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>surveillance device. <a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span> <span class="inserted"><ins><em>DJI
drone
- to snoop on other people, DJI</em></ins></span> is <span
class="removed"><del><strong>an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="inserted"><ins><em>you</a>.</p>
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
@@ -2800,140 +2803,163 @@
<p>Many employers are using nonfree
software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If</em></ins></span>
the <span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>program reports
- whether you are “active,”</em></ins></span> that <span
class="removed"><del><strong>the device</strong></del></span> is <span
class="removed"><del><strong>tethered to</strong></del></span> <span
class="inserted"><ins><em>in effect</em></ins></span> a <span
class="removed"><del><strong>server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that the device gives the
company</strong></del></span> <span
class="inserted"><ins><em>malicious</em></ins></span>
- surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>feature.</p></em></ins></span>
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that is in effect a malicious
+ surveillance feature.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202008030">
- <p>Google</em></ins></span> Nest <span
class="removed"><del><strong>Cam “smart”
camera</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
- update to its speaker devices using their back door</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
+ <li id="M202008030">
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update to its speaker devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This</em></ins></span> means the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
+ that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google was planning on disclosing
- this new feature and offering</em></ins></span> it to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>customers who pay for it.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
+ out prematurely and</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>accident and Google was planning on disclosing
+ this new feature and offering it to customers who pay for it.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202006300">
+ <li id="M202006300">
<p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
- <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>their own computers</a>, so the
- bosses</em></ins></span> can <span class="removed"><del><strong>contain
JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ <li>
+ <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>their own
computers</a>, so the
+ bosses</em></ins></span> can <span
class="removed"><del><strong>communicate with it,</strong></del></span> <span
class="inserted"><ins><em>spy on them.</p>
- <p>This shows why requiring</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span class="inserted"><ins><em>user's
“consent” is not
+ <p>This shows why requiring the user's
“consent”</em></ins></span> is <span class="inserted"><ins><em>not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything,</em></ins></span> even
<span class="removed"><del><strong>which page the user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>probable exposure
+ most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for
it.</p></em></ins></span>
+ be illegal and bosses that demand it should be prosecuted for it.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201911190">
- <p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had</em></ins></span>
+ a <span class="inserted"><ins><em>security vulnerability that enabled
attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
access the user's wifi password</a>, and snoop on the household
- through connected surveillance devices.</p>
-
- <p>Knowledge</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>the wifi
password would not be sufficient</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
+ through connected</em></ins></span> surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>devices.</p>
-<ul>
-<li><p>Computerized cars</strong></del></span> <span
class="inserted"><ins><em>carry
+ <p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
- security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span>
- software <span class="inserted"><ins><em>lack this. Of course,
they</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>also used by their
- manufacturers for snooping.</p></em></ins></span>
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span>
+ <li id="M201907210">
+ <p>Google “Assistant” records users'
conversations</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed</em></ins></span> to <span
class="removed"><del><strong>do because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>listen</a>. Thus,</em></ins></span> when
- <span class="removed"><del><strong>accessed through the modem. However,
even if</strong></del></span> <span class="inserted"><ins><em>one of Google's
+ when it</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
+ way to see or control what it records or sends.</p>
<p>Rather than trying to better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>user wants to send to some Google service.</p>
+ get commands that the user wants to send to some Google service.</p>
</li>
<li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
- than</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
- recordings made without a legitimate prompt), and sends</em></ins></span>
- it <span class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even</strong></del></span> <span class="inserted"><ins><em>to
Amazon's servers, which store it indefinitely. Even
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even</em></ins></span> if <span class="removed"><del><strong>no one
connects</strong></del></span> <span class="inserted"><ins><em>users request
deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>data
remain</em></ins></span> on <span class="inserted"><ins><em>other
servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
+ deleting</em></ins></span> the <span class="removed"><del><strong>fact
+ that the device is tethered to a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But it also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>company
+ surveillance capability.</p>
+ </li>
+
+ <li>
+ <p>The</strong></del></span> Nest <span
class="removed"><del><strong>Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>thermostat,</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain JavaScript
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ
garage opener</em></ins></span> and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
+ the <span class="removed"><del><strong>user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As a result,
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell
phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when
+ accessed through</strong></del></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>present, but</em></ins></span> in the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
@@ -2993,7 +3019,7 @@
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
+ told Amazon to do this, or cease</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>data
and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
</li>
@@ -3060,22 +3086,38 @@
<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span>
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing <a
-
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence of a
way</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>was in
+ these TVs, does not legitimize the surveillance.</p>
+ </li>
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
- monitor every aspect of what they do.</p>
+ <li><p>More or less all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>normal</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>companies
+ monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
</li>
</ul>
@@ -3086,45 +3128,47 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
- computer,</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p><small>(Note that this article misuses the word “<a
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
+
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>this article
misuses</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
+ to mean “crackers.”)</small></p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
- <li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could
be</em></ins></span> a <span class="removed"><del><strong>way to
- disable the surveillance, even if it were not hidden
as</strong></del></span>
- <span class="inserted"><ins><em>misunderstanding.
However,</em></ins></span> it <span class="removed"><del><strong>was in
- these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>is certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>More or less
all</strong></del></span>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
- <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to</em></ins></span> report <span class="removed"><del><strong>was as of
2014, but we don't expect this has got better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>its location</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>someone else and</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to
+ <span class="removed"><del><strong>the 600 millions social media
profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
too</a>.</p>
</li>
</ul>
@@ -3137,109 +3181,90 @@
<ul class="blurbs">
<li id="M202008181">
- <p>New Toyotas</em></ins></span> will
- <span class="removed"><del><strong>not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em><a
+ <p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span class="removed"><del><strong>report
what
- the user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>AWS to help create
custom insurance premiums</a>
- based</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that
advertisers</strong></del></span> <span class="inserted"><ins><em>driver
behaviour.</p>
+ upload data to AWS to help create custom insurance premiums</a>
+ based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span
class="removed"><del><strong>track</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If</em></ins></span> you
- <span class="removed"><del><strong>across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>want
+ <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
+ <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
GPS navigation, get a separate navigator which runs free software
and works with Open Street Map.</p>
</li>
<li id="M201912171">
- <p>Most modern cars now <a
-
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. For
- the user, access to the data is nearly impossible, as</em></ins></span> it
<span class="removed"><del><strong>enabled by default</strong></del></span>
<span class="inserted"><ins><em>involves
- cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ <p>Most modern cars</em></ins></span> now <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible sounds to be
+ picked up by proprietary malware</strong></del></span> running <span
class="removed"><del><strong>on other devices in
+ range so as to determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> with <span
class="removed"><del><strong>Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>proprietary
software.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ <span class="inserted"><ins><em><li id="M201903290">
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
</li>
-
- <li id="M201903290">
- <p>Tesla cars collect lots of personal data, and <a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>them</a>.</p>
+ <li><p>The Amazon “Smart” TV
+ <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
+ them</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in breaking the
- connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
- antenna</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
+ give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
+ <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
+ antenna in aluminum foil?</p>
</li>
<li id="M201811300">
- <p>In China, it is mandatory for electric
- cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
+ cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ forward</em></ins></span> it <span class="removed"><del><strong>is done
+ by free software</strong></del></span> <span class="inserted"><ins><em>to
the government-run platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
-
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a></em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
+
+ <p>In</strong></del></span> its <span
class="removed"><del><strong>privacy policy, Samsung explicitly
confirms</strong></del></span>
+ <span class="inserted"><ins><em>“connected” cars, minute by
minute.</p>
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
+ <p>GM did not get users' consent, but it could have
got</em></ins></span> that <span class="removed"><del><strong><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>easily by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
<p>But if you really want</em></ins></span> to
@@ -3283,39 +3308,38 @@
<ul>
<li>
- <p>The driver for</strong></del></span>
+ <p>The driver for a certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em><li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
+ to China</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></em></ins></span>
</li>
- <li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em>built-in
- cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span>
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201602240">
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely and make changes in various
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>make changes in
various
settings</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p>
+ <p>That's easy</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>do because the
system has no authentication
+ <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
when accessed through the modem. However, even if it asked
for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
enables the phone company</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>track the car's movements all the
time;</em></ins></span>
it <span class="removed"><del><strong>too</a>.
Here's information on
@@ -3360,14 +3384,14 @@
<p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend</strong></del></span>
<span class="inserted"><ins><em>others.</p>
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
- <p>The case of toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>matter of proprietary surveillance. These systems
- are an intolerable invasion</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use a back door to manipulate the game play for specific
players.</p>
+ <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate the game play for specific players.</p>
- <p>While</strong></del></span> <span
class="inserted"><ins><em>privacy, and should be replaced with
+ <p>While</strong></del></span> <span
class="inserted"><ins><em>matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money
can use</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done by malware. The
other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>car.</p></em></ins></span>
@@ -3433,7 +3457,10 @@
programs, so it
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
- but the <span class="removed"><del><strong>surveillance is an abuse
all</strong></del></span> <span class="inserted"><ins><em>surveillance is an
abuse all the same.</p>
+ but the surveillance is an abuse all the <span
class="removed"><del><strong>same.</p>
+
+<ul>
+ <li><p>When</strong></del></span> <span
class="inserted"><ins><em>same.</p>
<ul class="blurbs">
<li id="M201904210">
@@ -3457,10 +3484,7 @@
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on</em></ins></span> the <span class="removed"><del><strong>same.</p>
-
-<ul>
- <li><p>When</strong></del></span> <span
class="inserted"><ins><em>reporters that use it</a>.</p>
+ on the reporters that use it</a>.</p>
</li>
<li id="M201701060">
@@ -3615,15 +3639,16 @@
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices</a> to identify users.</p>
</li>
+<span class="removed"><del><strong></ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
<span class="inserted"><ins><em><li id="M201003010">
<p>Flash Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
- </li></em></ins></span>
-</ul>
-
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection --></strong></del></span>
+ </li>
+</ul></em></ins></span>
<div class="big-subsection">
@@ -3734,19 +3759,27 @@
<div style="clear: left;"></div>
<span class="removed"><del><strong><ul>
- <li><p>The natural extension of monitoring</strong></del></span>
+ <li><p>The natural extension of monitoring people through
+ “their” phones is</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201902040">
- <p>Google invites</em></ins></span> people <span
class="removed"><del><strong>through
- “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool” the
- monitoring</a>.</p>
+ <li id="M201905281">
+ <p>Microsoft</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in order to create
an account on</em></ins></span>
+ the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company's network. On top of mistreating their
users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p></em></ins></span>
</li>
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902040">
+ <p>Google invites people</em></ins></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
</li>
@@ -3857,7 +3890,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:43 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.352
retrieving revision 1.353
diff -u -b -r1.352 -r1.353
--- proprietary-surveillance.de.po 10 Nov 2020 17:37:43 -0000 1.352
+++ proprietary-surveillance.de.po 14 Nov 2020 09:33:00 -0000 1.353
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5633,6 +5633,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-surveillance.es.po 10 Nov 2020 17:37:43 -0000 1.96
+++ proprietary-surveillance.es.po 14 Nov 2020 09:33:00 -0000 1.97
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-03 12:12+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -5063,6 +5064,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.556
retrieving revision 1.557
diff -u -b -r1.556 -r1.557
--- proprietary-surveillance.fr.po 10 Nov 2020 17:37:43 -0000 1.556
+++ proprietary-surveillance.fr.po 14 Nov 2020 09:33:00 -0000 1.557
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-02 18:46+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5077,6 +5078,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-surveillance.it-diff.html 10 Nov 2020 17:37:43 -0000
1.204
+++ proprietary-surveillance.it-diff.html 14 Nov 2020 09:33:00 -0000
1.205
@@ -586,22 +586,11 @@
<li>
<p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>stores or played
by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>its
- own malware</a>.</p></em></ins></span>
+ <p>With free software apps, users could <em>make
sure</em></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
+ own malware</a>.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Pairs of Android</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -618,91 +607,56 @@
<ul class="blurbs">
<li id="M202006260">
- <p>Most</em></ins></span> apps <span
class="removed"><del><strong>can collude to transmit users' personal
- data to servers.</strong></del></span> <span
class="inserted"><ins><em>are malware, but
- Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
- <p>The article says</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends</strong></del></span> <span
class="inserted"><ins><em>Biden's</em></ins></span> app <span
class="removed"><del><strong>developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span> <span
class="inserted"><ins><em>has a less manipulative overall
- approach, but</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>does not tell us whether it has functionalities we
- consider malicious, such as sending data</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>user has not explicitly
+ <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
+ <p>With</strong></del></span> <span class="inserted"><ins><em>Biden's
app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
asked to send.</p>
</li>
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading the “Terms and Conditions” that spell out
-what</strong></del></span> <span class="inserted"><ins><em>make
sure</em></ins></span> they <span class="removed"><del><strong>are
“consenting” to. Google should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>information it collects on users,
instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps,
one</strong></del></span> <span class="inserted"><ins><em>software to make sure
they can't “fool”
+ the monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Edward Snowden,
<a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>only hope</strong></del></span> <span
class="inserted"><ins><em>take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>off,
listen to</em></ins></span> the <span class="removed"><del><strong>first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call,</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>and web browsing history, and
- read</em></ins></span> the <span
class="removed"><del><strong>tracking.</strong></del></span> <span
class="inserted"><ins><em>contact list.</em></ins></span> This <span
class="inserted"><ins><em>malware</em></ins></span> is
- <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
- from investigation.</p></em></ins></span>
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to disguise itself
+ from investigation.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201311120">
+ <li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>universal back door
that we know nearly all portable
- phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
+ detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>cannot stop
- them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
- to <span class="removed"><del><strong>the app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p>
</li>
</ul>
@@ -714,12 +668,9 @@
<ul class="blurbs">
<li id="M202009183">
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning
on</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p>
-
- <p>The article should</strong></del></span> <span
class="inserted"><ins><em>device's
+ <p>Facebook <a
+
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
@@ -727,95 +678,43 @@
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
made a practice of surreptitiously activating the Siri software to <a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
+ record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was to listen to</em></ins></span> these <span
class="removed"><del><strong>apps as
- “free”—they are</strong></del></span> <span
class="inserted"><ins><em>recordings, in a group that made
- transcripts of them. He does</em></ins></span> not <span
class="removed"><del><strong>free software. The clear</strong></del></span>
<span class="inserted"><ins><em>believes that Apple has ceased this
+ <p>His job was to listen to these recordings, in a group that made
+ transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable</em></ins></span> way to <span
class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>prevent this is,</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no
right</strong></del></span>
- <span class="inserted"><ins><em>controls access</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as</strong></del></span> <span class="inserted"><ins><em>the
microphone to decide when the user has
- “activated”</em></ins></span> any <span
class="removed"><del><strong>other snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span
class="inserted"><ins><em>service,</em></ins></span> to <span
class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>be free software,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola phones modify Android</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could make
- sure Apple can't listen</em></ins></span> to <span
class="inserted"><ins><em>them.</p>
+ <p>The only reliable way to prevent this is, for the program that
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free software, and the
+ operating system under it free as well. This way, users could make
+ sure Apple can't listen to them.</p>
</li>
<li id="M201910131">
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing</em></ins></span> data <span class="inserted"><ins><em>from
Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p>
- </li>
-
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>the Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>check URLs that possibly correspond to
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black list most
certainly
+ with the Chinese government, its Safe Browsing black list most certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
- <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>Apple proposes</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that
are busy at night</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
- and DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>snooping on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span class="inserted"><ins><em>likely that
most nonfree apps contain
- trackers. Some</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>these send personally identifying</em></ins></span>
data <span class="removed"><del><strong>to Apple's
servers</a>.</strong></del></span> <span class="inserted"><ins><em>such
as phone
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
is collected by the company, there is no telling what it will be
@@ -849,39 +748,24 @@
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>.</em></ins></span> Big
Brother can get
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The</em></ins></span> iMessage app on iThings <a
+ <li id="M201609280">
+ <p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
a server every phone number that the user types into it</a>; the
server records these numbers for at least 30 days.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47% of the most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
- </li>
-
- <li><p>iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
+ <li id="M201509240">
+ <p>iThings automatically upload to Apple's servers all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. <span
class="removed"><del><strong>[...]</strong></del></span> <span
class="inserted"><ins><em>[…]</em></ins></span>
</p></blockquote>
+ make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
@@ -897,11 +781,8 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
@@ -920,118 +801,81 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <a
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ for no possible purpose other than surveillance</a>. Here is the
<a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a</em></ins></span> class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312300">
+ <li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or
it</em></ins></span>
- is <span class="inserted"><ins><em>totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
+ is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing</em></ins></span> also <span
class="removed"><del><strong>a feature for web sites</strong></del></span>
<span class="inserted"><ins><em><a
+ <p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There is also a feature for web sites</em></ins></span> to track
users, which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
- <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
+ <li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202004300">
- <p>Xiaomi phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span
class="removed"><del><strong>phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>a song. They
send device identifying
+ <p>Xiaomi phones <a
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions the user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening to a song. They send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>web
- browsing history,</strong></del></span>
- <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Other nonfree programs snoop too. For instance, Spotify and
+ other streaming dis-services make a dossier about each user, and <a
href="/malware/proprietary-surveillance.html#M201508210"> they make
users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>same wrongs when
the culprits are not Chinese,
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
- <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em><a
+ <p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p></em></ins></span>
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811230">
+ <li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't</em></ins></span> send <span
class="removed"><del><strong>so much</strong></del></span> <span
class="inserted"><ins><em>the location data while in
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data, and sent them all later</a>.</p>
@@ -1065,65 +909,44 @@
<li id="M201507030">
<p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much</em></ins></span>
data that their
+ that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
+ of some kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308010">
- <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
+ <li id="M201308010">
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and <span class="removed"><del><strong>laptops</a>.
- (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
+ and laptops</a> (presumably Windows laptops). Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
- the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
+ <li id="M201307280">
+ <p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="inserted"><ins><em>Android
that <a
+ by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
+ sends personal data to Motorola</a>.</p>
</li>
<li id="M201307250">
<p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listens for voice all the time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>users that install the app</a>.</p>
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
<p>Merely asking the “consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
@@ -1132,8 +955,7 @@
honestly identify the information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
- <p>However, to truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ <p>However, to truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1141,21 +963,17 @@
<li id="M201111170">
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp appears to do lots of surveillance,
judging</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
<p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
@@ -1164,27 +982,16 @@
<li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used</em></ins></span> by <span
class="inserted"><ins><em>most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</em></ins></span> data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets
when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"></em></ins></span>
they <span class="removed"><del><strong>use its search engine.</p>
-
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>report even which page</em></ins></span>
the <span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
@@ -1204,50 +1011,29 @@
<ul class="blurbs">
<li id="M201912190">
<p>Some Avast and AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>users'
detailed browsing habits</a>. Mozilla</em></ins></span> and <span
class="inserted"><ins><em>Google
- removed</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
once more how unsafe nonfree software can be. Tools that are supposed
to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being the original
malware).</p></em></ins></span>
+ additional malware (the system itself being the original
malware).</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify who is running it</a>. The result is
- often</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes</em></ins></span> it <span class="removed"><del><strong>can
- alter them too</a>.
- </p></li>
+ makes it even more vicious.</p>
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
-
- <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1256,165 +1042,90 @@
<ul class="blurbs">
<li id="M202003010">
- <p>The Alipay Health Code</em></ins></span> app
- <span class="inserted"><ins><em>estimates whether the user has Covid-19
and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells the cops directly</a>.</p></em></ins></span>
- </li>
+ <p>The Alipay Health Code app
+ estimates whether the user has Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p>
+ </li>
+
+ <li id="M202001290">
+ <p>The Amazon Ring app does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for Amazon</a>.</p>
+ </li>
+
+ <li id="M201912220">
+ <p>The ToToc messaging app seems to be a <a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for the government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
+ reason to use free software instead.</p>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202001290">
- <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
- surveillance <span class="removed"><del><strong>software snoop on what
radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such</strong></del></span> <span class="inserted"><ins><em>for other
companies</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+ and Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging</em></ins></span> app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>the
government of the United Arab Emirates</a>.
- Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>that is a good
- reason</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>use free software instead.</p>
-
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
- is</strong></del></span> <span class="inserted"><ins><em>word
“free”</em></ins></span> in
- the <span class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p>
+ <p><small>Note: this article uses the word “free”
in
+ the sense of “gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
when used for work, give employers powerful <a
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a></em></ins></span> if <span
class="inserted"><ins><em>they install their own
- software on</em></ins></span> the <span class="removed"><del><strong>user
didn't “upload” them</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand</em></ins></span> to
<span class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span>
- <span class="inserted"><ins><em>employee, this</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware
(DRM</strong></del></span> <span class="inserted"><ins><em>simply nonfree
software, as fundamentally unjust</em></ins></span>
- and <span class="removed"><del><strong>snooping). In August
- 2015</strong></del></span> <span class="inserted"><ins><em>as dangerous
as any other nonfree software.</p>
+ snooping and sabotage capabilities</a> if they install their own
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
</li>
<li id="M201910130">
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant</em></ins></span> it
<a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>the
phone's microphone, photos, text messages, contacts, and
- internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>Android version was found to
contain</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing
developers</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether</strong></del></span> <span class="inserted"><ins><em>run any
code</em></ins></span> they <span class="removed"><del><strong>want that. This
is a typical example of</strong></del></span> <span
class="inserted"><ins><em>wish in</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>users'
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version</em></ins></span> of the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
- saying</em></ins></span> that <span class="removed"><del><strong>at least
is visible and
- optional</a>. Not as bad as what</strong></del></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>tests were only performed</em></ins></span> on the
<span class="removed"><del><strong>user</a>. This is in addition to
- the snooping done by</strong></del></span> <span
class="inserted"><ins><em>Android version
- of</em></ins></span> the <span class="removed"><del><strong>phone
company,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get
- users</strong></del></span> <span class="inserted"><ins><em>that,
according</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Apple, “this kind of
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p></em></ins></span>
+ Apple's operating system.”</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909091"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201909091">
+ <p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when</em></ins></span> it <span
class="removed"><del><strong>asked the user to
- approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
- into giving</em></ins></span> the app <span
class="removed"><del><strong>developer but did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
- weakness</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>its
+ tracks users even when it is turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
functionalities.</p>
</li>
<li id="M201909090">
<p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"></em></ins></span>
- send <span class="removed"><del><strong>any
information</strong></del></span> <span class="inserted"><ins><em>intimate
details of users' lives</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"></em></ins></span>
- A <span class="inserted"><ins><em>US prosecutor has demanded the list of
all the 10,000 or more people
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a</em></ins></span> free <span
class="removed"><del><strong>software flashlight
- app</strong></del></span> <span class="inserted"><ins><em>program
there</em></ins></span> would <span
class="removed"><del><strong>not.</p></strong></del></span> <span
class="inserted"><ins><em>not be a list of who has installed
- it.</p></em></ins></span>
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>then sends personal</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of the operating system, in order to gather as much
private</em></ins></span> data <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>as
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
@@ -1425,197 +1136,117 @@
<p>Many Android apps can track
users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>companies,
and the NSA takes advantage to spy through it too</a>.
- Here's information</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ <li id="M201905300">
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>toys with</strong></del></span>
<span class="inserted"><ins><em>event.</p>
-
- <p>This app is</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>even speak
- into</strong></del></span> <span class="inserted"><ins><em>contact list,
and has <a
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>phone.</p></em></ins></span>
+ near-complete control</a> over the phone.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>vibrator minute
by
- minute (thus, indirectly, whether</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="removed"><del><strong>was
surrounded by a person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>can easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
- standard with which manufacturers would</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
- and freedom to</em></ins></span> make <span
class="removed"><del><strong>statements about</strong></del></span> their <span
class="removed"><del><strong>products, rather than free software which users
could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
+ and freedom to make their own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
a new one is being developed</a>.</p>
</li>
<li id="M201904130">
- <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
+ <p>Google tracks the movements of Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
+ saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
- the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with</em></ins></span> a <span
class="inserted"><ins><em>huge number of <a
+ <p>Many Android phones come with a huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on
to user-installed apps that</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>figure out
- who</strong></del></span>
- the <span class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>network but no direct access
to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which the user</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
<p>A study of 24 “health” apps found that 19 of them
<a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
- “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
+ <li id="M201902230">
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
- way <span class="removed"><del><strong>to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer</strong></del></span> and <span
class="inserted"><ins><em>released them, apparently not realizing that
all</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
<p>It shows that no one can trust a nonfree program, not even the
developers of other nonfree programs.</p>
</li>
<li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>Low
Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span>
- <span class="inserted"><ins><em>preventing nonfree software developers
from including malware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p>
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the
app.</p>
</li>
@@ -1624,149 +1255,60 @@
be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
- them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing what they</em></ins></span>
really
-<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>their
+ addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>10
gratis VPN apps have lousy privacy policies</a>.</p>
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
<p><small>(It is unfortunate that these articles talk about
“free
- apps.” These apps are gratis, but</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>are <em>not</em></em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free
software</a>.)</small></p>
</li>
-</ul>
-
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>.</em></ins></span> The
<span class="removed"><del><strong>Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>company</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>We think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>about a side issue.
What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
+ Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
<li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>report even which page</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
@@ -2037,43 +1579,58 @@
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ even if the user didn't “upload” them to the
service.</p></em></ins></span>
</li>
- <li id="M201605310">
- <p>Facebook's app listens all the time, <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605310">
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in
stores</strong></del></span> or <span class="removed"><del><strong>played by TV
programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
+ <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal
+ data to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
- <p>Apps that include <a
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
<span class="inserted"><ins><em>include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201511190">
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ unrelated to the app's functionality, was</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</em></ins></span> the <span class="removed"><del><strong>personal
details of users</strong></del></span> <span class="inserted"><ins><em>500 most
popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
“free”—they are not free software. The clear way
to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that the usual analytics tools are
+ <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
@@ -2082,22 +1639,40 @@
<li id="M201510300">
<p>More than 73% and 47% of mobile applications, for Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
+ personal, behavioral and location information</a></em></ins></span>
of <span class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>is not enough
+to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>with
third parties.</p>
</li>
<li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
+ <p>Like</em></ins></span> most <span
class="removed"><del><strong>users have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects</strong></del></span> <span
class="inserted"><ins><em>“music screaming” disservices, Spotify is
+ based</em></ins></span> on <span class="removed"><del><strong>users,
instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>proprietary
malware (DRM and snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>some are
starting
to realize that it is nasty.</p>
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component of Android)</strong></del></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span
class="inserted"><ins><em>“serve”
+ users better</a>—never mind whether they want
that.</em></ins></span> This is
+ <span class="removed"><del><strong>yet another</strong></del></span> <span
class="inserted"><ins><em>a
+ typical</em></ins></span> example of <span
class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>the attitude of the proprietary</em></ins></span>
software <span class="removed"><del><strong>pretending to
obey</strong></del></span> <span class="inserted"><ins><em>industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -2106,7 +1681,9 @@
<li id="M201506264">
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
+ A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
@@ -2114,34 +1691,50 @@
“free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
- <li id="M201505060">
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
+ <p>Gratis</em></ins></span> Android apps <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>location information</a> of
their users with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on the
average.</p></em></ins></span>
</li>
- <li id="M201504060">
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ QR-code scanner apps snoop on the user</a>. This is in
addition</em></ins></span> to
+ the <span class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>snooping done by
the phone company, and perhaps by the OS</em></ins></span> in
+ the <span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>phone.</p>
<p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
- malware.</p>
+ get users</em></ins></span> to say
+ <span class="removed"><del><strong>“zero
price”</strong></del></span> <span class="inserted"><ins><em>“I
agree”. That</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>no excuse</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span>
+ <span class="inserted"><ins><em>malware.</p>
</li>
<li id="M201411260">
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ report which other apps</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
+
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="removed"><del><strong>that valid? Software developers
have no right to
+ analyze what users are</strong></del></span> doing <span
class="removed"><del><strong>or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>this in a
way</em></ins></span> that <span class="removed"><del><strong>snoop are
+ just</strong></del></span> <span class="inserted"><ins><em>at least is
visible and optional</a>. Not</em></ins></span>
+ as <span class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> as <span
class="removed"><del><strong>any</strong></del></span> <span
class="inserted"><ins><em>what the others do.</p>
</li>
<li id="M201401150.1">
@@ -2154,37 +1747,59 @@
<p>The nonfree Snapchat app's principal purpose is to restrict the
use of data on the user's computer, but it does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ it tries to get the user's list of</em></ins></span> other <span
class="removed"><del><strong>snooping.</p></strong></del></span> <span
class="inserted"><ins><em>people's phone
+ numbers</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but</strong></del></span>
- <li id="M201312060">
+ <span class="inserted"><ins><em><li id="M201312060">
<p>The Brightest Flashlight app <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would not.</p>
+ approve sending personal data to the app developer but
did</em></ins></span> not <span class="removed"><del><strong><a
href="/philosophy/free-sw.html">free software</a>)
+ connect</strong></del></span> <span class="inserted"><ins><em>ask
+ about sending it</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>other
companies. This shows</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>weakness of
+ the reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
+ <span class="inserted"><ins><em>surveillance: why should a flashlight
app</em></ins></span> send <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>any
information</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
</li>
- <li id="M201212100">
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
<p>Skype refuses to say whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
@@ -2200,131 +1815,246 @@
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the
phone</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202010221">
- <p>Microsoft is imposing its
- surveillance on the game of Minecraft by <a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its network,
+ <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>snooping</strong></del></span> <span
class="inserted"><ins><em>imposing its
+ surveillance</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> <span class="inserted"><ins><em>the
game</em></ins></span> of <span class="removed"><del><strong>personal data to
Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
+ every <span class="removed"><del><strong>phone number
that</strong></del></span> <span class="inserted"><ins><em>player to open an
account on Microsoft's network</a>. Microsoft
+ has bought</em></ins></span> the <span class="removed"><del><strong>user
types</strong></del></span> <span class="inserted"><ins><em>game and will merge
all accounts</em></ins></span> into <span
class="removed"><del><strong>it</a>;</strong></del></span> <span
class="inserted"><ins><em>its network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p>
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
+ having speech-recognition systems listen. Both intrude on
privacy.</p></em></ins></span>
</li>
- <li id="M201806240">
+ <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users
with</strong></del></span> <span class="inserted"><ins><em>sends it
to</em></ins></span> third <span
class="removed"><del><strong>parties.</p></strong></del></span> <span
class="inserted"><ins><em>parties</a>.</p></em></ins></span>
</li>
- <li id="M201804144">
+ <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> the
<span class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on all <span
class="removed"><del><strong>your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed</strong></del></span> <span
class="inserted"><ins><em>open processes running</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud feature
is</strong></del></span> <span class="inserted"><ins><em>its user's
computer</a>.</p>
</li>
<li id="M201711070">
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ video game consoles snoop on their users and report to</em></ins></span>
the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
+ <p>A game console</em></ins></span> is a <span
class="removed"><del><strong>way to</strong></del></span> <span
class="inserted"><ins><em>computer, and you can't trust a computer with
a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
<p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
+ collected</em></ins></span> by <span class="removed"><del><strong>default
so it still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of</strong></del></span>
<span class="inserted"><ins><em>various cr…apps and sites made by
different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
-
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ <p>They use</em></ins></span> this <span
class="inserted"><ins><em>data</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>buy things, and hunt for
+ “whales” who</em></ins></span> can <span
class="removed"><del><strong>access any</strong></del></span> <span
class="inserted"><ins><em>be led to spend a lot</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and get other info too.</p>
+ </li>
+
+ <li><p>There is</strong></del></span> <span
class="inserted"><ins><em>money. They</em></ins></span> also
+ <span class="inserted"><ins><em>use</em></ins></span> a <span
class="removed"><del><strong>feature for web sites</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> to <span
class="removed"><del><strong>track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That</strong></del></span> <span
class="inserted"><ins><em>manipulate the game play for specific
players.</p>
+
+ <p>While the</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6, but it
+ is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> <span class="inserted"><ins><em>describes gratis
games, games</em></ins></span> that <span class="inserted"><ins><em>cost
money</em></ins></span>
+ can <span class="removed"><del><strong>be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>use the same tactics.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401280">
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</em></ins></span> for <span class="removed"><del><strong>the
state</a>.</p>
</li>
- <li id="M201401280">
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>companies, and</em></ins></span> the NSA <span
class="removed"><del><strong>snoop on all the data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>takes advantage
+ to spy through</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
- <li id="M200510200">
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>.
Here</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200510200">
+ <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a hidden
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ have nothing to do with cheating.</p></em></ins></span>
</li>
</ul>
-<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+<div <span class="removed"><del><strong>class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
+ <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
+
+<span class="removed"><del><strong><ul>
+ <li><p>According to Edward Snowden,</strong></del></span>
+<span class="inserted"><ins><em><div style="clear: left;"></div>
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>turn the
phones</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>and off, listen to the microphone, retrieve
geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware is designed to
+ disguise itself from investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that <span
class="removed"><del><strong>their transmission is</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>Don't be</em></ins></span> a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice</strong></del></span> <span
class="inserted"><ins><em>sucker—reject</em></ins></span> all the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+
+ <p><small>(It is unfortunate</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2332,7 +2062,10 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
+<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
@@ -2341,28 +2074,58 @@
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
- the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p>
+ every second of what the user is watching</a>.
This</em></ins></span> is <span class="inserted"><ins><em>illegal
due</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+ the <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span> of
<span class="removed"><del><strong>data on the user's
computer,</strong></del></span> <span
class="inserted"><ins><em>1988,</em></ins></span> but <span
class="inserted"><ins><em>they're circumventing</em></ins></span>
+ it <span class="removed"><del><strong>does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>through
EULAs.</p>
</li>
<li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>user's list</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own
words</em></ins></span> of <span class="removed"><del><strong>other people's
phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>the company's
+ CTO, and this data is sold to third parties. This is</em></ins></span> in
<span class="removed"><del><strong>Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable,
according</em></ins></span> to <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>him,
+ is that it is opt-in</em></ins></span> in <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
+ and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>it will</a>
+ pre-install on some of its phones. The app</strong></del></span> <span
class="inserted"><ins><em>all future updates</em></ins></span> will <span
class="removed"><del><strong>give Verizon</strong></del></span> <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>same
+ information about the users' searches</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart TV,
for</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
+ they use its search engine.</p>
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
+ <p>Currently,</strong></del></span>
+ <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't
spying</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>, and</strong></del></span> <span class="inserted"><ins><em>you
is
+ to disconnect it from</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>Internet, and use
a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
@@ -2375,84 +2138,158 @@
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article for</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+ is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ does not legitimize the</em></ins></span> surveillance.</p>
</li>
- <li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
-
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who
+ is in the frame.</p>
- <p>It is possible to turn this off, but having it enabled by default
+ <p>This spyware feature seems</strong></del></span>
+ <span class="inserted"><ins><em>across devices.</p>
+
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>company
+ already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore, even if the user didn't “upload” them to the
service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>unaware
they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
+ users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
</li>
<li id="M201507240">
- <p>Vizio “smart” TVs recognize and <a
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others do.</p>
</li>
- <li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on <span class="inserted"><ins><em>what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the
phone</strong></del></span> <span
class="inserted"><ins><em>another</em></ins></span> company, <span
class="inserted"><ins><em>Nuance</a>.
+ Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span> <span class="inserted"><ins><em>US
or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span
class="inserted"><ins><em>free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
@@ -2464,7 +2301,7 @@
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ snooping all</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
@@ -2472,57 +2309,74 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>whether the app developers</strong></del></span>
<span class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
+ <p>This shows that laws requiring products to</em></ins></span> get
+ <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>users' formal
consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws would</em></ins></span> say <span
class="removed"><del><strong>“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>that
TVs are not allowed to report what the
+ user watches—no exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the</em></ins></span> user <span
class="removed"><del><strong>data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>watches, and the switch to turn</em></ins></span>
this <span class="removed"><del><strong>app because it
asked</strong></del></span> <span class="inserted"><ins><em>off has
no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal</strong></del></span> <span
class="inserted"><ins><em>server could save that</em></ins></span> data <span
class="removed"><del><strong>to the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ do lots</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
</li>
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
@@ -2531,25 +2385,32 @@
<p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ see</em></ins></span> through <span class="removed"><del><strong>it
too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
@@ -2559,32 +2420,42 @@
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a <a
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201711244"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711100">
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -2614,58 +2485,135 @@
customers.</p>
</li>
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
+ conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009270">
<p>Many employers are using nonfree
software, including videoconference software, to <a
@@ -2676,112 +2624,133 @@
</li>
<li id="M202008030">
- <p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ <p>Google</em></ins></span> Nest <span
class="removed"><del><strong>Cam “smart”
camera</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
+ is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
+ update to its speaker devices using their back door</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This means the devices now listen for more
+ that an alarm is happening. This</em></ins></span> means the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
than just their wake words. Google says the software update was sent
out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for
it.</p></em></ins></span>
+ this new feature and offering</em></ins></span> it to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>customers who pay for it.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span>
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M202006300">
<p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
-<li><p>Computerized cars</strong></del></span> <span
class="inserted"><ins><em>their own computers</a>, so the
- bosses can spy on them.</p>
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>their own computers</a>, so the
+ bosses</em></ins></span> can <span class="removed"><del><strong>contain
Javascript code,</strong></del></span> <span class="inserted"><ins><em>spy on
them.</p>
<p>This shows why requiring the user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+ be illegal</em></ins></span> and <span class="inserted"><ins><em>bosses
that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to <a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
+ a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant surveillance if the devices implemented proper
- security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span>
- software <span class="inserted"><ins><em>lack this. Of course, they are
also used by their
+ <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>wifi
password would not be sufficient to carry
+ out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also</em></ins></span> used by
<span class="removed"><del><strong>most US libraries,</strong></del></span>
<span class="inserted"><ins><em>their
manufacturers for snooping.</p>
</li>
<li id="M201907210">
- <p>Google “Assistant” records users' conversations <a
-
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
+ <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when
one</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ way</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>see or
control what it records or sends.</p>
+
+ <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
- <p>Rather than trying to better control the use of recordings, Google
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers,
which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>system has no authentication
when</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be</em></ins></span> accessed <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
<span class="inserted"><ins><em>tethered to. Moreover, they are made available
to
- Alexa. As a result, Amazon</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
- at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
- in the <span class="removed"><del><strong>car is
+ speakers are likewise stored longer than necessary on the
servers</em></ins></span>
+ the <span class="removed"><del><strong>modem. However, even if it asked
for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are
tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
@@ -2805,45 +2774,65 @@
which is made available</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
+ paying for the subscription,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
- <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
- paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
+ <p>Even though the ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
- working order.</p>
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="removed"><del><strong>doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
+ <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>product</em></ins></span> in <span
class="inserted"><ins><em>that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.)</small></p>
+ </li>
+
+ <li id="M201804140">
+ <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ </li>
+
+ <li id="M201706204">
+ <p>Lots of “smart” products are designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+
+ <p>Today's technological practice does not include any way of making
+ a device that</em></ins></span> can <span
class="removed"><del><strong>store it.</p>
</li>
</ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially
spying</em></ins></span>
+ on <span class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -2852,92 +2841,49 @@
<div style="clear: left;"></div>
<ul>
- <li><p>Nest thermometers
- send</strong></del></span> <span class="inserted"><ins><em>say no?</p>
-
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
- </li>
-
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>woman came
up to me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ <li><p>Nest</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped, it could be saving up
records
+ about you for later examination.</p>
</li>
- <li id="M201706204">
- <p>Lots of</em></ins></span> “smart” <span
class="inserted"><ins><em>products are designed</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
-
- <p>Today's technological practice does not include any
way</em></ins></span> of <span
class="inserted"><ins><em>making</em></ins></span>
- a <span class="removed"><del><strong>way to
- disable the surveillance, even</strong></del></span> <span
class="inserted"><ins><em>device that can obey your voice commands without
potentially spying
- on you. Even</em></ins></span> if it <span
class="removed"><del><strong>were not hidden as</strong></del></span> <span
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span
class="removed"><del><strong>was in
- these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>could be saving up records
- about you for later examination.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
- <li id="M201310260">
- <p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on their
<span class="removed"><del><strong>users</a>.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
- <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span> <span
class="inserted"><ins><em>renters</a>.</p>
+ <span class="inserted"><ins><em><li id="M201310260">
+ <p><a
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p></em></ins></span>
+ monitor how often people wear it</a>.</p>
- <p>This <span class="removed"><del><strong>shows that laws requiring
products</strong></del></span> <span class="inserted"><ins><em>will teach the
sheeple</em></ins></span> to <span class="removed"><del><strong>get users'
formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>find it normal
that companies
- monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2948,46 +2894,54 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
+ privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
+ computer, the TV reports what it is. The existence of a way to
+ disable</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>child.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
-
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>this article
misuses</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>word “<a
+ <p><small>(Note that this article misuses</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
<span class="inserted"><ins><em><li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
+ that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>back door, but</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
+ <li id="M201407090">
<p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
- too</a>.</p>
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to report <span class="removed"><del><strong>what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>its location to someone else and to transmit
conversations
+ too</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2997,78 +2951,87 @@
<ul class="blurbs">
<li id="M202008181">
- <p>New Toyotas will <a
- href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that
advertisers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure you can
- disconnect its cellular antenna and its GPS antenna. If you want
+ <p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span
class="removed"><del><strong>track</strong></del></span>
+ <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If</em></ins></span> you
+ <span class="removed"><del><strong>across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>want
GPS navigation, get a separate navigator which runs free software
- and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
+ and works with Open Street Map.</p>
</li>
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
- cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
+ record and send various kinds of data</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as</em></ins></span> it
<span class="removed"><del><strong>enabled by default</strong></del></span>
<span class="inserted"><ins><em>involves
+ cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
<span class="inserted"><ins><em>proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>a junkyard the
driver's personal data goes with
- them</a>.</p>
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
<li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>the
internal car network</a>. It is constantly
- connected</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of
data,
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
- key is removed, and users report</em></ins></span> that they <span
class="removed"><del><strong>are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>can't disable it.</p>
+ key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
- connectivity by disconnecting the cellular modem, or wrapping the
- antenna in aluminum foil?</p></em></ins></span>
+ connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
+ antenna</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811300">
- <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
- cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
</li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
+ to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span class="inserted"><ins><em><li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
@@ -3101,12 +3064,12 @@
<a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
- <p>LG later said it had installed a patch to stop this, but any
product
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
+ is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
could spy this way.</p>
<p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> <span class="inserted"><ins><em>software
- is free so we know it won't collect any</em></ins></span> of <span
class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
@@ -3188,14 +3151,14 @@
<span class="inserted"><ins><em><li id="M201303250">
<p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data</strong></del></span>
+ collect</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
- available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
+ records information about drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies, and others.</p>
<p>The case of toll-collection systems, mentioned in this article,
- is not really a matter of proprietary surveillance. These systems
+ is not really</em></ins></span> a <span class="removed"><del><strong>wide
range</strong></del></span> <span
class="inserted"><ins><em>matter</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>proprietary surveillance. These systems
are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
<p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
@@ -3250,17 +3213,14 @@
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web sites are not
+<p>In addition, many web sites spy on <span
class="removed"><del><strong>their visitors. Web sites are not
+ programs, so it</strong></del></span> <span class="inserted"><ins><em>their
visitors. Web sites are not
programs, so it
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
but the surveillance is an abuse all the same.</p>
-<span class="removed"><del><strong><ul>
-
- <li><p>When</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
@@ -3273,16 +3233,22 @@
</li>
<li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
+ <p>Until 2015, any tweet that listed a geographical
tag</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent</em></ins></span> the <span class="removed"><del><strong>surveillance
is an abuse all</strong></del></span> <span class="inserted"><ins><em>precise
GPS location to Twitter's server</a>. It still
contains these GPS locations.</p>
</li>
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on the reporters that use it</a>.</p>
+ on</em></ins></span> the <span class="removed"><del><strong>same.</p>
+
+<ul>
+
+ <li><p>When</strong></del></span> <span
class="inserted"><ins><em>reporters that use it</a>.</p>
</li>
<li id="M201701060">
@@ -3374,7 +3340,7 @@
getting sued</a> for this.</p>
<p>The chat facilities of some customer services
use</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>same sort of
- malware to <a
+ malware</em></ins></span> to <span class="removed"><del><strong>directly
examine users' data</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
read what the user is typing before it is posted</a>.</p>
</li>
@@ -3413,7 +3379,7 @@
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>identify users.</p>
+ “fingerprinting” devices</a> to identify users.</p>
</li>
<li id="M201003010">
@@ -3499,22 +3465,22 @@
<p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio to its
servers</a>.</p>
- </li>
-
- <li id="M201308040">
- <p>Google Chrome <a
- href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
- spies on browser history, affiliations</a>, and other installed
- software.</p></em></ins></span>
+ activates microphones and transmits audio to its
servers</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Flash is also used
for</strong></del></span>
- <span class="inserted"><ins><em><li id="M200809060">
- <p>Google Chrome contains a key logger that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ <span class="inserted"><ins><em><li id="M201308040">
+ <p>Google Chrome</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices </a> to identify
users.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ <span
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ spies on browser history, affiliations</a>, and other installed
+ software.</p>
+ </li>
+
+ <li id="M200809060">
+ <p>Google Chrome contains a key logger that <a
+
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
</li>
</ul>
@@ -3534,19 +3500,27 @@
<div style="clear: left;"></div>
<span class="removed"><del><strong><ul>
- <li><p>The natural extension of monitoring</strong></del></span>
+ <li><p>The natural extension of monitoring people through
+ “their” phones is</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201902040">
- <p>Google invites</em></ins></span> people <span
class="removed"><del><strong>through
- “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</strong></del></span> to <span
class="removed"><del><strong>make sure they can't “fool” the
- monitoring</a>.</p>
+ <li id="M201905281">
+ <p>Microsoft</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in order to create
an account on</em></ins></span>
+ the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company's network. On top of mistreating their
users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p></em></ins></span>
</li>
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able to listen for speech</strong></del></span>
<span class="inserted"><ins><em><a
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902040">
+ <p>Google invites people</em></ins></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
</li>
@@ -3657,7 +3631,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:43 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.364
retrieving revision 1.365
diff -u -b -r1.364 -r1.365
--- proprietary-surveillance.it.po 10 Nov 2020 17:37:43 -0000 1.364
+++ proprietary-surveillance.it.po 14 Nov 2020 09:33:00 -0000 1.365
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5290,6 +5290,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- proprietary-surveillance.ja-diff.html 10 Nov 2020 17:37:43 -0000
1.222
+++ proprietary-surveillance.ja-diff.html 14 Nov 2020 09:33:00 -0000
1.223
@@ -1661,134 +1661,80 @@
<p>It</strong></del></span> <span class="inserted"><ins><em>poor
medical condition.</p>
- <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span class="inserted"><ins><em>buried
in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <li><p>Tivo's alliance with Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>buried in
- lengthy terms of service that</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span> <span
class="inserted"><ins><em>difficult</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>understand. In any
case,
- “consent” is not sufficient</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by</strong></del></span> <span
class="inserted"><ins><em>legitimize snooping.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
- <li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>malware running on other devices in
- range so as</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also <a
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing</em></ins></span> that
<span class="inserted"><ins><em>all the personal
- data</em></ins></span> they <span class="removed"><del><strong>are nearby.
Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>collected
would go to Facebook as well.</p>
-
- <p>It shows that no one</em></ins></span> can
- <span class="removed"><del><strong>correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't</strong></del></span> <span
class="inserted"><ins><em>trust</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ sent personal data</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
+ <li id="M201902140">
+ <p>The AppCensus database gives</em></ins></span> information <span
class="removed"><del><strong>with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
- misuse</em></ins></span> users' <span class="removed"><del><strong>voice
on</strong></del></span> <span class="inserted"><ins><em>personal
data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em><a
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>would then have to
- give it to</strong></del></span> <span class="inserted"><ins><em><a
+ Advertising ID</a></em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span class="removed"><del><strong>US
or some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done</strong></del></span>
<span class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>free software</strong></del></span> <span
class="inserted"><ins><em>resetting it.</p>
+ 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>hardware
identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
- <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ <p>Collecting hardware identifiers is</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was</em></ins></span> in
- <span class="removed"><del><strong><a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches, and
- the switch to turn this off has</strong></del></span> no <span
class="removed"><del><strong>effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>hurry to take action. This proves</em></ins></span>
- that the
- <span class="removed"><del><strong>transmission
reports</strong></del></span> <span class="inserted"><ins><em>policies
of</em></ins></span> a <span class="removed"><del><strong>404 error really
means nothing;</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>take action. This proves</em></ins></span>
+ that <span class="removed"><del><strong>they are nearby. Once your
+ Internet devices</strong></del></span> <span
class="inserted"><ins><em>the policies of a development
platform</em></ins></span> are <span class="removed"><del><strong>paired with
your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>ineffective at
preventing nonfree software developers from including malware in
- their programs.</p>
+ their programs.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if it isn't</strong></del></span>
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>server
- could save</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
</li>
-
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps</em></ins></span>
that <span class="removed"><del><strong>data anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>used to
- be</em></ins></span> on <span class="removed"><del><strong>the user's
local network.</a></p>
-
- <p>LG later said it</strong></del></span> <span
class="inserted"><ins><em>Google Play</em></ins></span> had <span
class="removed"><del><strong>installed a patch to stop this, but any product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
- stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>even what they wanted to
record.</a></p>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>surveillance feature for</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
-</ul>
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop</strong></del></span> <span
class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>redirecting
- them</em></ins></span> to <span class="removed"><del><strong>the
- internet</a>— even what</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole</em></ins></span> their
<span class="removed"><del><strong>users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a</strong></del></span> <span class="inserted"><ins><em>credentials.
Furthermore,
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from</em></ins></span> nonfree
<span class="removed"><del><strong>operating system.</p>
- </li>
-
- <li><p>Modern gratis game cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</strong></del></span> <span class="inserted"><ins><em>apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>wide range</strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
- friends and associates</a>.</p>
-
- <p>Even nastier,</strong></del></span> <span
class="inserted"><ins><em>knowing what</em></ins></span> they <span
class="inserted"><ins><em>really do.</p>
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
<li id="M201902010">
@@ -3019,8 +2965,8 @@
sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
+ <p>The cars can also collect lots of other data: listening to
you,</em></ins></span>
+ watching <span class="inserted"><ins><em>you, following your movements,
tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
@@ -3047,9 +2993,9 @@
access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to</em></ins></span> do <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>because the system has no authentication
- when accessed</em></ins></span> through <span
class="removed"><del><strong>ad networks</strong></del></span> <span
class="inserted"><ins><em>the modem. However, even if it asked
- for authentication, you couldn't be confident</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>Nissan
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
has no access. The software in the car is proprietary, <a
href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
@@ -3060,29 +3006,23 @@
</li>
<li id="M201306140">
- <p>Tesla cars allow</em></ins></span> the <span
class="inserted"><ins><em>company to extract</em></ins></span>
- data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>sites made by different
- companies.</p>
-
- <p>They use</strong></del></span> <span
class="inserted"><ins><em>determine the car's location
+ <p>Tesla cars allow the company to extract
+ data remotely and determine the car's location
at any time. (See Section 2, paragraphs b and c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>data to
manipulate people</strong></del></span>
- <span class="inserted"><ins><em>information, but if the state orders
it</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>get the
data</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>store it.</p>
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it to get the data and hand it
+ over, the state can store it.</p>
</li>
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
records information about drivers' movements</a>, which is made
- available</em></ins></span> to <span class="removed"><del><strong>spend a
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers,
insurance companies, and others.</p>
+ available to car manufacturers, insurance companies, and others.</p>
- <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>back
door</strong></del></span> <span class="inserted"><ins><em>matter of
proprietary surveillance. These systems
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but the invasion isn't done by malware. The
other cases mentioned are done by proprietary malware in the car.</p>
@@ -3100,27 +3040,23 @@
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
- free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
+ free rein to pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
-
- <p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
+ creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
- <p>You</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the
<span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>maximum possible
+ <p>You can bet Facebook will implement the maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
- system with nonfree software in it.</p></em></ins></span>
+ system with nonfree software in it.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
-
<div class="big-section">
@@ -3135,11 +3071,7 @@
makes no sense to call them “free” or
“proprietary”</a>,
but the surveillance is an abuse all the same.</p>
-<span class="removed"><del><strong><ul>
-
- <li><p>Online</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
@@ -3173,101 +3105,89 @@
</li>
<li id="M201612064">
- <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
+ <p>Online sales, with tracking and surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>. Most of
the tracking is done by recording interactions with servers, but
proprietary software contributes.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
- </li>
-
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405140">
+ <li id="M201405140">
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
- data</a>.</p></em></ins></span>
+ Microsoft SkyDrive allows the NSA to directly examine users'
+ data</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210240">
- <p>Many</em></ins></span> web sites rat their visitors to advertising
+ <li id="M201210240">
+ <p>Many web sites rat their visitors to advertising
networks that track users. Of the top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
(as of 5/17/2012) fed their visitors third-party cookies, allowing
other sites to track them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201208210">
- <p>Many</em></ins></span> web sites report all their visitors
+ <li id="M201208210">
+ <p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p></em></ins></span>
+ tells Google the IP address</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>page that was
visited</a>.</p></em></ins></span>
</li>
-
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
<span class="inserted"><ins><em><li id="M201200000">
- <p>Many</em></ins></span> web sites try to collect users' address
books (the user's list
- of other people's phone numbers or email addresses). This violates
- the privacy of those other people.</p>
+ <p>Many web sites try to collect</em></ins></span> users' <span
class="removed"><del><strong>voice on</strong></del></span> <span
class="inserted"><ins><em>address books (the user's list
+ of other people's phone numbers or email addresses). This
violates</em></ins></span>
+ the <span class="removed"><del><strong>internet</strong></del></span>
<span class="inserted"><ins><em>privacy of those other people.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201110040">
+ <li id="M201110040">
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>track visitors to those pages</a>—even
users
- that don't have Facebook accounts.</p></em></ins></span>
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it and would
then</strong></del></span> <span class="inserted"><ins><em>track visitors to
those pages</a>—even users
+ that don't</em></ins></span> have <span class="inserted"><ins><em>Facebook
accounts.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection --></strong></del></span>
-
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInChrome">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInJavaScript">JavaScript</h4>
+ <h4 id="SpywareInJavaScript">JavaScript</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
<ul class="blurbs">
<li id="M201811270">
<p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>,</em></ins></span> in <span
class="removed"><del><strong>Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
-</div>
-
-<ul>
- <li><p>Google Chrome makes it easy</strong></del></span> <span
class="inserted"><ins><em>order to learn their identity. Some are <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
+ to
+ <span class="removed"><del><strong>give it</strong></del></span> <span
class="inserted"><ins><em>snoop on information that users have typed into a
+ form but not sent</a>, in order</em></ins></span> to <span
class="removed"><del><strong>the US or</strong></del></span> <span
class="inserted"><ins><em>learn their identity. Some are <a
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a></em></ins></span> for <span
class="removed"><del><strong>an extension</strong></del></span> <span
class="inserted"><ins><em>this.</p>
+ getting sued</a> for this.</p>
- <p>The chat facilities of some customer services use the same sort of
- malware</em></ins></span> to <span
class="removed"><del><strong>do</strong></del></span> <a
- <span
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping</strong></del></span>
+ <p>The chat facilities of</em></ins></span> some <span
class="removed"><del><strong>other government.</p>
+ <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>customer services use the same sort of
+ malware</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in your own computer.</p>
+ </li>
+ <li><p>Spyware in</strong></del></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports</strong></del></span>
<span
class="inserted"><ins><em>href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is posted</a>.</p>
+ read</em></ins></span> what the user <span
class="removed"><del><strong>watches, and
+ the switch to turn this off has no effect. (The fact that the
+ transmission reports a 404 error really means nothing; the server
+ could save that data anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>is typing before</em></ins></span> it <span
class="inserted"><ins><em>is posted</a>.</p>
</li>
<li id="M201807190">
- <p>British Airways used <a
-
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal
data</em></ins></span> on
+ <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
+ JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web
site to give</em></ins></span> other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>companies personal data</em></ins></span> on
<span class="inserted"><ins><em>its customers</a>.</p>
</li>
@@ -3279,120 +3199,203 @@
<li id="M201711150">
<p>Some websites send
- JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>browsing</a>, and many of them do
so.</p></strong></del></span> <span class="inserted"><ins><em>input, <a
-
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>local network.</a></p>
+
+ <p>LG later said it had installed a patch to stop this, but any
product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>input,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
code.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInFlash">Spyware in
Flash</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInFlash">Flash</h4></em></ins></span>
+ <h4 id="SpywareInFlash">Flash</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Flash</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify users.</p>
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>identify users.</p>
</li>
<li id="M201003010">
- <p>Flash</em></ins></span> Player's <a
+ <p>Flash Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
+ cookie feature helps web sites track
visitors</a>.</p></em></ins></span>
</li>
+</ul>
- <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
-<span class="inserted"><ins><em></ul>
+<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInChrome">Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInChrome">#SpywareInChrome</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>— even what their users weigh.</p>
+
+ <p>A game console</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201906220">
- <p>Google Chrome</em></ins></span> is <span
class="removed"><del><strong>also used</strong></del></span> <span
class="inserted"><ins><em>an <a
-
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit to advertising and
- data companies, first of all to Google. Moreover, if users have a
- Gmail account, Chrome automatically logs them in to the
browser</em></ins></span> for
+ <p>Google Chrome</em></ins></span> is <span
class="removed"><del><strong>a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
+ </li>
+
+ <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>an</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
+ instrument</em></ins></span> of <span class="removed"><del><strong>data
about their users and their</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade</em></ins></span>
+ users'
+ <span class="removed"><del><strong>friends</strong></del></span> <span
class="inserted"><ins><em>computers</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> the <span
class="removed"><del><strong>data
+ collected by various cr…apps and</strong></del></span> sites
<span class="removed"><del><strong>made by different
+ companies.</p>
+
+ <p>They use this</strong></del></span> <span
class="inserted"><ins><em>they visit to advertising and</em></ins></span>
+ data <span class="inserted"><ins><em>companies, first of
all</em></ins></span> to <span class="removed"><del><strong>manipulate
people</strong></del></span> <span class="inserted"><ins><em>Google. Moreover,
if users have a
+ Gmail account, Chrome automatically logs them in</em></ins></span> to
<span class="removed"><del><strong>buy things, and hunt</strong></del></span>
<span class="inserted"><ins><em>the browser</em></ins></span> for <span
class="removed"><del><strong>“whales” who can be
led</strong></del></span>
<span class="inserted"><ins><em>more convenient profiling. On Android,
Chrome also reports their
- location to Google.</p>
+ location</em></ins></span> to <span
class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+
+ <p>The best way to escape surveillance is to switch to <a
+ href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>modified version</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>Firefox
+ with several changes</em></ins></span> to <span
class="removed"><del><strong>manipulate the game play for specific
players.</p>
- <p>The best way to escape surveillance is to switch
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a></strong></del></span>
- <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version of Firefox
- with several changes</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>protect users'
privacy.</p></em></ins></span>
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<p><a href="/philosophy/javascript-trap.html">Javascript
code</a></strong></del></span>
+<!-- #SpywareOnTheWeb -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheWeb">Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201704131">
<p>Low-priced Chromebooks for schools are <a
href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
- collecting far more data on students than</em></ins></span> is <span
class="removed"><del><strong>another method</strong></del></span> <span
class="inserted"><ins><em>necessary, and store
- it indefinitely</a>. Parents and students complain about the
lack</em></ins></span>
- of <span class="removed"><del><strong>“fingerprinting”
devices.</p>
-
-
-<!-- #SpywareEverywhere -->
-<div class="big-section">
- <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
+ collecting far more data</em></ins></span> on <span
class="inserted"><ins><em>students than is necessary, and store
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>Web</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
</div>
<div style="clear: left;"></div>
+<p>In addition, many web sites spy</strong></del></span> <span
class="inserted"><ins><em>lack
+ of transparency</em></ins></span> on <span
class="removed"><del><strong>their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but</strong></del></span> the <span
class="removed"><del><strong>surveillance is an abuse all</strong></del></span>
<span class="inserted"><ins><em>part of both</em></ins></span> the <span
class="removed"><del><strong>same.</p>
+
<ul>
- <li><p>The natural extension</strong></del></span> <span
class="inserted"><ins><em>transparency on the part</em></ins></span> of <span
class="removed"><del><strong>monitoring people through
- “their” phones</strong></del></span> <span
class="inserted"><ins><em>both the educational services and the
- schools, the difficulty of opting out of these services, and the lack
+
+ <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>educational services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
+ schools, the difficulty</em></ins></span> of <span
class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>.
Most</strong></del></span> <span class="inserted"><ins><em>opting
out</em></ins></span> of <span class="inserted"><ins><em>these services,
and</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>lack
of proper privacy policies, among other things.</p>
- <p>But complaining is not sufficient. Parents, students and teachers
- should realize that the software Google uses to spy on students is
+ <p>But complaining</em></ins></span> is <span
class="removed"><del><strong>done by recording interactions with
+ servers, but proprietary software contributes.</p>
+ </li>
+
+ <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input</strong></del></span> <span
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span>
and <span class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
+ </li>
+
+ <li><p>Pages that contain “Like” buttons
+ <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors to those pages</a>—even
+ users that don't have Facebook accounts.</p>
+ </li>
+
+ <li><p>Many web sites rat their visitors to advertising
networks</strong></del></span> <span class="inserted"><ins><em>teachers
+ should realize</em></ins></span> that <span
class="removed"><del><strong>track
+ users. Of</strong></del></span> the <span
class="removed"><del><strong>top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+ sites</strong></del></span> <span class="inserted"><ins><em>software
Google uses</em></ins></span> to <span class="removed"><del><strong>track
them</a>.</p>
+ </li>
+
+ <li><p>Many web sites report all their
visitors</strong></del></span> <span class="inserted"><ins><em>spy on students
is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to <a
href="/education/edu-schools.html">
+ to persuade school officials</em></ins></span> to <span
class="removed"><del><strong>Google by using
+ the Google Analytics service, which</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
exclusively use free software</a> for both education and school
- administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board to refuse the
- budget unless the school initiates a switch to free software. If
- education</em></ins></span> is <span class="removed"><del><strong><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary</strong></del></span> <span class="inserted"><ins><em>run
nation-wide, they need to persuade legislators
- (e.g., through free</em></ins></span> software <span
class="inserted"><ins><em>organizations, political parties,
- etc.)</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>migrate</em></ins></span> the
- <span class="removed"><del><strong>monitoring</a>.</p>
+ administration. If</em></ins></span> the <span
class="removed"><del><strong>IP address</strong></del></span> <span
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and
<span class="inserted"><ins><em>teachers
+ can mandate their representatives at</em></ins></span> the <span
class="removed"><del><strong>page that was visited.</a></p>
</li>
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span> <span
class="inserted"><ins><em>public schools</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>free software.</p>
+ <li><p>Many web sites try</strong></del></span> <span
class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>collect users' address books (the
+ user's list of other people's phone numbers or email addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>refuse</em></ins></span> the <span
class="removed"><del><strong>privacy of those other people.</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span>
+ <span class="inserted"><ins><em>budget unless</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>school initiates a switch</em></ins></span> to <span
class="removed"><del><strong>directly examine users' data</a>.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>free software. If
+ education is run nation-wide, they need</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+ <li><p>Google</strong></del></span> <span
class="inserted"><ins><em>persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
</li>
<li id="M201507280">
- <p>Google Chrome makes it easy</em></ins></span> for <span
class="removed"><del><strong>speech all</strong></del></span> <span
class="inserted"><ins><em>an extension to do <a
+ <p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on</em></ins></span> the <span class="removed"><del><strong>time,
even when “off.”</a></p></strong></del></span> <span
class="inserted"><ins><em>user's browsing</a>, and many of them do
so.</p>
+ snooping on the user's browsing</a>, and many of them do
so.</p>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li><p>Flash Player's</strong></del></span>
- <li id="M201506180">
- <p>Google Chrome includes a module that <a
-
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio to its
servers</a>.</p>
+ <span class="inserted"><ins><em><li id="M201506180">
+ <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio to its
servers</a>.</p></em></ins></span>
</li>
- <li id="M201308040">
+ <span class="removed"><del><strong><li><p>Flash is also used
for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308040">
<p>Google Chrome <a
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
@@ -3400,31 +3403,64 @@
</li>
<li id="M200809060">
- <p>Google Chrome contains a key logger that <a
-
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ <p>Google Chrome contains a key logger that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a> to identify
users.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareInVR
--></strong></del></span>
+<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
+is another method of “fingerprinting” devices.</p>
+
+
+<!-- #SpywareEverywhere --></strong></del></span>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareInVR">Spyware In
VR</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInNetworks">Spyware in
Networks</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVR">#SpywareInVR</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
+ <h3 <span class="removed"><del><strong>id="SpywareEverywhere">Spyware
Everywhere</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInNetworks">Spyware in
Networks</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareEverywhere">#SpywareEverywhere</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<span class="removed"><del><strong><ul>
- <li><p>VR equipment, measuring every slight motion, creates the
- potential</strong></del></span>
+ <li><p>The natural extension of monitoring people through
+ “their” phones is</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201902040">
- <p>Google invites people to <a
+ <li id="M201905281">
+ <p>Microsoft</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in order to create
an account on</em></ins></span>
+ the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company's network. On top of mistreating their
users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902040">
+ <p>Google invites people</em></ins></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
+ let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
+ </li>
+</ul>
+
+<!-- #SpywareInVR -->
+<div class="big-section">
+ <h3 id="SpywareInVR">Spyware In VR</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>VR equipment, measuring every slight motion, creates the
+ potential</strong></del></span> <span class="inserted"><ins><em>internet
use in their
homes,</em></ins></span> for <span class="inserted"><ins><em>an
extravagant payment of $20</a>.</p>
<p>This is not a malicious functionality of a program with some other
@@ -3520,7 +3556,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 17:37:43 $
+$Date: 2020/11/14 09:33:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.346
retrieving revision 1.347
diff -u -b -r1.346 -r1.347
--- proprietary-surveillance.ja.po 10 Nov 2020 17:37:44 -0000 1.346
+++ proprietary-surveillance.ja.po 14 Nov 2020 09:33:01 -0000 1.347
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4205,6 +4205,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary-surveillance.pot 10 Nov 2020 17:37:44 -0000 1.285
+++ proprietary-surveillance.pot 14 Nov 2020 09:33:01 -0000 1.286
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3401,6 +3401,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a "
+"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
+"people to give their phone number</a> in order to create an account on the "
+"company's network. On top of mistreating their users by providing nonfree "
+"software, Microsoft is imposing surveillance on people and violating their "
+"privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a "
"href=\"https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss\">
"
"let Google monitor their phone use, and all internet use in their homes, for "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.643
retrieving revision 1.644
diff -u -b -r1.643 -r1.644
--- proprietary-surveillance.ru.po 10 Nov 2020 17:37:44 -0000 1.643
+++ proprietary-surveillance.ru.po 14 Nov 2020 09:33:01 -0000 1.644
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 17:26+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5019,6 +5020,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary.de-diff.html 10 Nov 2020 11:02:53 -0000 1.188
+++ proprietary.de-diff.html 14 Nov 2020 09:33:01 -0000 1.189
@@ -109,8 +109,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 540 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>November,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 550 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M202006120">
<p>The company behind Zoom does not only deny
users' computer freedom by developing this piece
@@ -248,27 +266,6 @@
be used for surveillance and/or violating people's rights in many ways,
such as turning their purchased software to a subscription
product.</p>
</li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players to spend money by overwhelming the game play with loot
- boxes</a>.</p>
- </li>
-
- <li id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
- </li>
</ul>
</div></em></ins></span>
@@ -332,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:53 $
+$Date: 2020/11/14 09:33:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary.de.po 10 Nov 2020 11:02:54 -0000 1.228
+++ proprietary.de.po 14 Nov 2020 09:33:01 -0000 1.229
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -98,9 +98,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+450+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2017,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -108,8 +108,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -465,6 +465,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -506,49 +525,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-# | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
-# | [-uses-] {+misuses+} the [-term <a
-# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
-# | {+word “<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean
-# | “crackers.”)</small>+}
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\">“monetize”</a>."
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
-"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -651,6 +627,18 @@
#, fuzzy
#~| msgid ""
+#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
+#~ "words-to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#, fuzzy
+#~| msgid ""
#~| "The Amazon “smart” TV is <a href=\"http://www.theguardian."
#~| "com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-"
#~| "listening-surveillance\"> snooping all the time</a>."
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary.es.po 11 Nov 2020 10:09:03 -0000 1.337
+++ proprietary.es.po 14 Nov 2020 09:33:01 -0000 1.338
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -88,9 +89,18 @@
"de ser engañado."
#. type: Content of: <div><p>
+# | As of [-September,-] {+November,+} 2020, the pages in this directory list
+# | around 450 instances of malicious functionalities (with more than
+# | 5[-4-]{+5+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Hasta septiembre de 2020, las páginas de este directorio ofrecÃan una lista
"
@@ -319,6 +329,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -386,52 +415,6 @@
"derechos de los usuarios de múltiples maneras, como convertir el software "
"que han comprado en un producto por suscripción."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-"El adictivo juego Genshin Impact <a href=\"https://www.theguardian.com/"
-"games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">está plagado de cajas de botÃn con las que se presiona sin cesar a los "
-"jugadores para que se gasten el dinero</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"Los relojes con software privativo conectados a internet son <cite>malware</"
-"cite> que vulnera la privacidad de la gente (en especial de los niños). "
-"Además, tienen un montón de fallos de seguridad. <a
href=\"https://www.wired."
-"com/story/kid-smartwatch-security-vulnerabilities/\">Permiten a delincuentes "
-"informáticos (y personas sin autorización) el acceso</a> al reloj."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"De este modo, personas no autorizadas con malas intenciones pueden "
-"interceptar las comunicaciones entre los padres y el hijo y enviar mensajes "
-"falsificados a y desde el reloj que pueden poner en peligro al niño."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>(Advierta que este artÃculo emplea mal la palabra «<a href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">hacker</a>» para referirse a "
-"«cracker»)</small>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -511,3 +494,47 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">coerces players to spend money by overwhelming the game "
+#~ "play with loot boxes</a>."
+#~ msgstr ""
+#~ "El adictivo juego Genshin Impact <a href=\"https://www.theguardian.com/"
+#~ "games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
+#~ "\">está plagado de cajas de botÃn con las que se presiona sin cesar a
los "
+#~ "jugadores para que se gasten el dinero</a>."
+
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\"> permit security breakers (and unauthorized "
+#~ "people) to access</a> the watch."
+#~ msgstr ""
+#~ "Los relojes con software privativo conectados a internet son "
+#~ "<cite>malware</cite> que vulnera la privacidad de la gente (en especial "
+#~ "de los niños). Además, tienen un montón de fallos de seguridad. <a
href="
+#~ "\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"
+#~ "\">Permiten a delincuentes informáticos (y personas sin autorización) el
"
+#~ "acceso</a> al reloj."
+
+#~ msgid ""
+#~ "Thus, ill-intentioned unauthorized people can intercept communications "
+#~ "between parent and child and spoof messages to and from the watch, "
+#~ "possibly endangering the child."
+#~ msgstr ""
+#~ "De este modo, personas no autorizadas con malas intenciones pueden "
+#~ "interceptar las comunicaciones entre los padres y el hijo y enviar "
+#~ "mensajes falsificados a y desde el reloj que pueden poner en peligro al "
+#~ "niño."
+
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "<small>(Advierta que este artÃculo emplea mal la palabra «<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hacker</a>» para referirse a "
+#~ "«cracker»)</small>"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary.fr.po 10 Nov 2020 22:44:18 -0000 1.380
+++ proprietary.fr.po 14 Nov 2020 09:33:01 -0000 1.381
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-10 20:33+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -86,9 +87,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-September,-] {+November,+} 2020, the pages in this directory list
+# | around 450 instances of malicious functionalities (with more than
+# | 5[-4-]{+5+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"En septembre 2020, les pages de ce répertoire dénombraient à peu près 450
"
@@ -315,6 +325,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -382,54 +411,6 @@
"manières, par exemple en transformant les logiciels qu'ils ont achetés en "
"produits vendus par abonnement."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-"Genshin Impact est un jeu addictif qui, sans cesse, <a href=\"https://www."
-"theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
-"over-the-world\">force les joueurs à dépenser de l'argent en submergeant la
"
-"partie de boîtes à butin</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"Les montres connectées utilisant du logiciel privateur sont des objets "
-"malfaisants, car elles violent la vie privée des gens et en particulier des "
-"enfants. De plus, elles ont un grand nombre de vulnérabilités. <a href="
-"\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">Les "
-"briseurs de sécurité peuvent y accéder</a> ainsi que des personnes non "
-"autorisées."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"Ainsi, des personnes non autorisées et mal intentionnées peuvent
intercepter "
-"les communications entre un parent et son enfant et contrefaire des messages "
-"Ã destination ou en provenance de la montre, ce qui peut mettre l'enfant en "
-"danger."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » pour désigner des pirates
informatiques "
-"â aussi appelés crackers.)</small>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +485,50 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">coerces players to spend money by overwhelming the game "
+#~ "play with loot boxes</a>."
+#~ msgstr ""
+#~ "Genshin Impact est un jeu addictif qui, sans cesse, <a href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">force les joueurs à dépenser de l'argent en submergeant
"
+#~ "la partie de boîtes à butin</a>."
+
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\"> permit security breakers (and unauthorized "
+#~ "people) to access</a> the watch."
+#~ msgstr ""
+#~ "Les montres connectées utilisant du logiciel privateur sont des objets "
+#~ "malfaisants, car elles violent la vie privée des gens et en particulier "
+#~ "des enfants. De plus, elles ont un grand nombre de vulnérabilités. <a "
+#~ "href=\"https://www.wired.com/story/kid-smartwatch-security-"
+#~ "vulnerabilities/\">Les briseurs de sécurité peuvent y accéder</a> ainsi
"
+#~ "que des personnes non autorisées."
+
+#~ msgid ""
+#~ "Thus, ill-intentioned unauthorized people can intercept communications "
+#~ "between parent and child and spoof messages to and from the watch, "
+#~ "possibly endangering the child."
+#~ msgstr ""
+#~ "Ainsi, des personnes non autorisées et mal intentionnées peuvent "
+#~ "intercepter les communications entre un parent et son enfant et "
+#~ "contrefaire des messages à destination ou en provenance de la montre, ce "
+#~ "qui peut mettre l'enfant en danger."
+
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "<small>(Notez que cet article utilise le terme « <a href=\"/philosophy/"
+#~ "words-to-avoid.html#Hacker\">hackers</a> » pour désigner des pirates "
+#~ "informatiques â aussi appelés crackers.)</small>"
+
+#~ msgid ""
#~ "Roblox (among many other games) created anti-features which sucker "
#~ "children into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-"
#~ "kids-spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-"
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary.it-diff.html 10 Nov 2020 11:02:54 -0000 1.200
+++ proprietary.it-diff.html 14 Nov 2020 09:33:01 -0000 1.201
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -109,8 +109,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 540 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>November,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 550 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M202006120">
<p>The company behind Zoom does not only deny
users' computer freedom by developing this piece
@@ -247,27 +265,6 @@
be used for surveillance and/or violating people's rights in many ways,
such as turning their purchased software to a subscription
product.</p>
</li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players to spend money by overwhelming the game play with loot
- boxes</a>.</p>
- </li>
-
- <li id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
- </li>
</ul>
</div></em></ins></span>
@@ -331,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:54 $
+$Date: 2020/11/14 09:33:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary.it.po 10 Nov 2020 11:02:54 -0000 1.237
+++ proprietary.it.po 14 Nov 2020 09:33:01 -0000 1.238
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -94,9 +94,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+450+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2017,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -104,8 +104,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -470,6 +470,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -511,37 +530,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.ja-diff.html 10 Nov 2020 11:02:54 -0000 1.205
+++ proprietary.ja-diff.html 14 Nov 2020 09:33:01 -0000 1.206
@@ -62,8 +62,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -106,8 +106,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 540 references to
+<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>November,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 550 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -156,13 +156,13 @@
<ul>
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
@@ -210,6 +210,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M202006120">
<p>The company behind Zoom does not only deny
users' computer freedom by developing this piece
@@ -246,27 +264,6 @@
be used for surveillance and/or violating people's rights in many ways,
such as turning their purchased software to a subscription
product.</p>
</li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players to spend money by overwhelming the game play with loot
- boxes</a>.</p>
- </li>
-
- <li id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
- </li>
</ul>
</div></em></ins></span>
@@ -330,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:54 $
+$Date: 2020/11/14 09:33:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary.ja.po 10 Nov 2020 11:02:54 -0000 1.221
+++ proprietary.ja.po 14 Nov 2020 09:33:01 -0000 1.222
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -92,8 +92,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -328,6 +328,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -369,37 +388,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.nl-diff.html 10 Nov 2020 11:02:54 -0000 1.201
+++ proprietary.nl-diff.html 14 Nov 2020 09:33:01 -0000 1.202
@@ -109,8 +109,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 540 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>November,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 550 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M202006120">
<p>The company behind Zoom does not only deny
users' computer freedom by developing this piece
@@ -247,27 +265,6 @@
be used for surveillance and/or violating people's rights in many ways,
such as turning their purchased software to a subscription
product.</p>
</li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players to spend money by overwhelming the game play with loot
- boxes</a>.</p>
- </li>
-
- <li id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
- </li>
</ul>
</div></em></ins></span>
@@ -331,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:54 $
+$Date: 2020/11/14 09:33:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- proprietary.nl.po 10 Nov 2020 11:02:54 -0000 1.211
+++ proprietary.nl.po 14 Nov 2020 09:33:01 -0000 1.212
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -96,9 +96,9 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April, 2019,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around 4[-0-]{+5+}0 instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2019,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around 4[-0-]{+5+}0 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -106,8 +106,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
@@ -373,6 +373,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -414,37 +433,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.pl-diff.html 10 Nov 2020 11:02:54 -0000 1.218
+++ proprietary.pl-diff.html 14 Nov 2020 09:33:01 -0000 1.219
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As of September, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 540
references to
+<p>As of November, 2020, the pages in this directory list around 450
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 550
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -154,19 +154,19 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -210,6 +210,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M202006120">
<p>The company behind Zoom does not only deny
users' computer freedom by developing this piece
@@ -246,27 +264,6 @@
be used for surveillance and/or violating people's rights in many ways,
such as turning their purchased software to a subscription
product.</p>
</li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players to spend money by overwhelming the game play with loot
- boxes</a>.</p>
- </li>
-
- <li id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
- </li>
</ul>
</div></em></ins></span>
@@ -330,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:54 $
+$Date: 2020/11/14 09:33:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary.pl.po 10 Nov 2020 11:02:54 -0000 1.204
+++ proprietary.pl.po 14 Nov 2020 09:33:01 -0000 1.205
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -135,8 +135,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -554,6 +554,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -595,37 +614,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.pot 10 Nov 2020 11:02:54 -0000 1.201
+++ proprietary.pot 14 Nov 2020 09:33:01 -0000 1.202
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -70,8 +70,8 @@
#. type: Content of: <div><p>
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -263,6 +263,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a "
+"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\">lets
"
+"banks and creditors deactivate people's Android devices</a> if they fail to "
+"make payments. If someone's device gets deactivated, it will be limited to "
+"basic functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a "
+"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
+"people to give their phone number</a> in order to create an account on the "
+"company's network. On top of mistreating their users by providing nonfree "
+"software, Microsoft is imposing surveillance on people and violating their "
+"privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a "
@@ -305,36 +324,6 @@
"turning their purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a "
-"href=\"https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world\">coerces
"
-"players to spend money by overwhelming the game play with loot boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a "
-"href=\"https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/\">
"
-"permit security breakers (and unauthorized people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean "
-"“crackers.”)</small>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary.pt-br-diff.html 10 Nov 2020 11:02:54 -0000 1.10
+++ proprietary.pt-br-diff.html 14 Nov 2020 09:33:01 -0000 1.11
@@ -101,8 +101,8 @@
<hr class="thin" />
</div>
-<p>As of <span class="removed"><del><strong>July,</strong></del></span>
<span class="inserted"><ins><em>September,</em></ins></span> 2020, the pages in
this directory list around 450
-instances of malicious functionalities (with more than <span
class="removed"><del><strong>520</strong></del></span> <span
class="inserted"><ins><em>540</em></ins></span> references to
+<p>As of <span class="removed"><del><strong>July,</strong></del></span>
<span class="inserted"><ins><em>November,</em></ins></span> 2020, the pages in
this directory list around 450
+instances of malicious functionalities (with more than <span
class="removed"><del><strong>520</strong></del></span> <span
class="inserted"><ins><em>550</em></ins></span> references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -187,99 +187,97 @@
<ul class="blurbs">
<li <span class="removed"><del><strong>id="M202007010">
- <p>BMW will remotely</strong></del></span> <span
class="inserted"><ins><em>id="M202006120">
- <p>The company behind Zoom does not only deny
- users' computer freedom by developing this piece
- of nonfree software, it also violates users' civil rights
by</em></ins></span> <a
+ <p>BMW will remotely</strong></del></span> <span
class="inserted"><ins><em>id="M202011060">
+ <p>A new app published by Google</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
enable</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship">banning
- events</em></ins></span> and <span class="removed"><del><strong>disable
functionality</strong></del></span> <span class="inserted"><ins><em>censoring
users</a> to serve the agenda of governments.</p>
-
- <p>Freedom respecting programs such as <a
- href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> or
BigBlueButton
- can be used instead, better still if installed</em></ins></span> in <span
class="removed"><del><strong>cars</a> through</strong></del></span> a
<span class="removed"><del><strong>universal
- back door.</p></strong></del></span> <span
class="inserted"><ins><em>server controlled
- by its users.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks</em></ins></span> and <span class="removed"><del><strong>disable
functionality in cars</a> through a universal
+ back door.</p></strong></del></span> <span
class="inserted"><ins><em>creditors deactivate people's Android
devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M202006300">
- <p>“Bossware”</strong></del></span> <span
class="inserted"><ins><em>id="M202010221">
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>malware that bosses <a
-
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>, so the
- bosses can spy</strong></del></span> <span
class="inserted"><ins><em>imposing its
- surveillance</em></ins></span> on <span
class="removed"><del><strong>them.</p>
-
- <p>This shows why requiring</strong></del></span> the <span
class="removed"><del><strong>user's “consent” is
not</strong></del></span> <span class="inserted"><ins><em>game of Minecraft by
<a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open</em></ins></span> an <span
class="removed"><del><strong>adequate basis for protecting digital privacy.
The boss can coerce
- most workers</strong></del></span> <span class="inserted"><ins><em>account
on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts</em></ins></span> into
<span class="removed"><del><strong>consenting to almost anything, even probable
exposure</strong></del></span> <span class="inserted"><ins><em>its network,
- which will give them access</em></ins></span> to <span
class="removed"><del><strong>contagious disease that can be fatal. Software
like this should
- be illegal and bosses</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
-
- <p>Minecraft players <a
- href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>demand</strong></del></span> it <span
class="removed"><del><strong>should be prosecuted for
it.</p></strong></del></span> <span class="inserted"><ins><em>is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p></em></ins></span>
+ <p>“Bossware” is malware that
bosses</strong></del></span> <span class="inserted"><ins><em>id="M201905281">
+ <p>Microsoft</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give</em></ins></span> their <span
class="removed"><del><strong>own computers</a>, so the
+ bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone
number</a> in order to create an account</em></ins></span> on <span
class="removed"><del><strong>them.</p>
+
+ <p>This shows why requiring</strong></del></span>
+ the <span class="removed"><del><strong>user's
“consent”</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
+ nonfree software, Microsoft</em></ins></span> is <span
class="removed"><del><strong>not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contagious disease that can be fatal. Software like this should
+ be illegal</strong></del></span> <span class="inserted"><ins><em>imposing
surveillance on people</em></ins></span> and <span
class="removed"><del><strong>bosses that demand it should be prosecuted for
it.</p></strong></del></span>
+ <span class="inserted"><ins><em>violating their
privacy.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M201504210">
- <p>Runescape</strong></del></span> <span
class="inserted"><ins><em>id="M201912160">
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>a popular online game with some <a
+ <p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
- addictive features</a> derived from</strong></del></span> <a
- <span
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness">
+ addictive features</a> derived from <a
+ href="/proprietary/proprietary-addictions.html#addictiveness">
behavioral manipulation techniques</a>. Certain
- repetitive aspects of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use</em></ins></span> the <span class="removed"><del><strong>game,
like <a
- href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
- grinding</a>,</strong></del></span> <span
class="inserted"><ins><em>Windows operating system, which is malware. The
account</em></ins></span> can
- be <span class="removed"><del><strong>minimised by
becoming</strong></del></span> <span class="inserted"><ins><em>used for
surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to</em></ins></span> a <span
class="removed"><del><strong>paying member, and can
- thus encourage children and impressionable people</strong></del></span>
<span class="inserted"><ins><em>subscription product.</p>
- </li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players</em></ins></span> to spend money <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>by overwhelming</em></ins></span> the <span
class="removed"><del><strong>game.</p></strong></del></span> <span
class="inserted"><ins><em>game play with loot
- boxes</a>.</p></em></ins></span>
+ repetitive aspects</strong></del></span> <span
class="inserted"><ins><em>id="M202006120">
+ <p>The company behind Zoom does not only deny
+ users' computer freedom by developing this piece</em></ins></span>
+ of <span class="inserted"><ins><em>nonfree software, it also violates
users' civil rights by <a
+
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship">banning
+ events and censoring users</a> to serve</em></ins></span> the <span
class="removed"><del><strong>game, like</strong></del></span> <span
class="inserted"><ins><em>agenda of governments.</p>
+
+ <p>Freedom respecting programs such as</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
+ grinding</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a>
or BigBlueButton</em></ins></span>
+ can be <span class="removed"><del><strong>minimised by
becoming</strong></del></span> <span class="inserted"><ins><em>used instead,
better still if installed in</em></ins></span> a <span
class="removed"><del><strong>paying member, and can
+ thus encourage children and impressionable people to spend money on
+ the game.</p></strong></del></span> <span
class="inserted"><ins><em>server controlled
+ by its users.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M202006260">
- <p>Most apps</strong></del></span> <span
class="inserted"><ins><em>id="M202009100">
- <p>Internet-enabled watches with proprietary
software</em></ins></span>
- are malware, <span class="removed"><del><strong>but
- Trump's campaign app, like Modi's campaign app, is <a
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app,</strong></del></span>
<span class="inserted"><ins><em>id="M202010221">
+ <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on users as well
- as snooping on them itself</a>.</p>
+ especially nasty malware, helping companies snoop</strong></del></span>
<span class="inserted"><ins><em>imposing its
+ surveillance</em></ins></span> on <span class="removed"><del><strong>users
as well
+ as snooping</strong></del></span> <span class="inserted"><ins><em>the game
of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account</em></ins></span> on <span
class="removed"><del><strong>them itself</a>.</p>
- <p>The article says that Biden's app has</strong></del></span> <span
class="inserted"><ins><em>violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>less manipulative overall
- approach, but that does not tell us whether it has functionalities we
- consider malicious, such as sending data the user has not explicitly
- asked to send.</p>
+ <p>The article says that Biden's app</strong></del></span> <span
class="inserted"><ins><em>Microsoft's network</a>.
Microsoft</em></ins></span>
+ has <span class="removed"><del><strong>a less manipulative overall
+ approach, but</strong></del></span> <span class="inserted"><ins><em>bought
the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>does not tell us
whether</strong></del></span> it <span class="removed"><del><strong>has
functionalities we
+ consider malicious, such as sending data</strong></del></span> <span
class="inserted"><ins><em>is free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>user has not explicitly
+ asked to send.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li id="M202006250">
- <p>TV manufacturers are able to <a
+ <li <span class="removed"><del><strong>id="M202006250">
+ <p>TV manufacturers are</strong></del></span> <span
class="inserted"><ins><em>id="M201912160">
+ <p>Microsoft is <a
+
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
+ users to create an account on their network</a> to
be</em></ins></span> able to <span class="removed"><del><strong><a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second</strong></del></span> <span
class="inserted"><ins><em>lot</em></ins></span> of <span
class="removed"><del><strong>what the user is watching</a>. This is
illegal due</strong></del></span> <span class="inserted"><ins><em>security
flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>Video Privacy Protection Act of 1988, but they're
circumventing
- it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p></em></ins></span>
+ every second of what</strong></del></span> <span
class="inserted"><ins><em>install
+ and use</em></ins></span> the <span class="removed"><del><strong>user is
watching</a>. This</strong></del></span> <span
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is
<span class="removed"><del><strong>illegal due</strong></del></span> <span
class="inserted"><ins><em>malware. The account can
+ be used for surveillance and/or violating people's rights in many ways,
+ such as turning their purchased software</em></ins></span> to
+ <span class="removed"><del><strong>the Video Privacy Protection Act of
1988, but they're circumventing
+ it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>a subscription product.</p></em></ins></span>
</li>
</ul>
@@ -343,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:54 $
+$Date: 2020/11/14 09:33:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- proprietary.pt-br.po 10 Nov 2020 11:02:55 -0000 1.336
+++ proprietary.pt-br.po 14 Nov 2020 09:33:01 -0000 1.337
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -91,8 +91,8 @@
#| "of malicious functionalities (with more than 520 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Até janeiro de 2020, as páginas neste diretório listam quase 450 exemplos
de "
@@ -318,6 +318,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -359,43 +378,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>Note: this article uses the word “free” in the sense "
-#| "of “gratis.”</small>"
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
-"sentido de âgrátisâ.</small>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -470,6 +452,18 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
+#, fuzzy
+#~| msgid ""
+#~| "<small>Note: this article uses the word “free” in the sense "
+#~| "of “gratis.”</small>"
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â
no "
+#~ "sentido de âgrátisâ.</small>"
+
#~ msgid ""
#~ "BMW will remotely <a href=\"https://www.cnet.com/roadshow/news/bmw-"
#~ "vehicle-as-a-platform/\"> enable and disable functionality in cars</a> "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.415
retrieving revision 1.416
diff -u -b -r1.415 -r1.416
--- proprietary.ru.po 10 Nov 2020 11:31:47 -0000 1.415
+++ proprietary.ru.po 14 Nov 2020 09:33:01 -0000 1.416
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -89,9 +90,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-September,-] {+November,+} 2020, the pages in this directory list
+# | around 450 instances of malicious functionalities (with more than
+# | 5[-4-]{+5+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Ðа ÑенÑÑбÑÑ 2020 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 450 "
@@ -318,6 +328,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -385,53 +414,6 @@
"Ñеловека ÑазнÑми ÑпоÑобами, напÑимеÑ,
обÑаÑением пÑиобÑеÑеннÑÑ
ими пÑогÑамм "
"в пÑодÑкÑ, ÑабоÑаÑÑий по подпиÑке."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-"ÐÑзÑваÑÑÐ°Ñ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ Ð¸Ð³Ñа Genshin Impact
неÑÑÑанно <a href=\"https://www."
-"theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
-"over-the-world\">пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¸Ð³Ñоков ÑÑаÑиÑÑ
денÑги, загÑÐ¾Ð¼Ð¾Ð¶Ð´Ð°Ñ Ð¸Ð³ÑÑ "
-"лÑÑбокÑами</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"ÐаÑÑÑнÑе ÑаÑÑ Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑением к ÐнÑеÑнеÑÑ,
ÑабоÑаÑÑие под ÑпÑавлением "
-"неÑвободнÑÑ
пÑогÑамм, ÑодеÑжаÑ
вÑедоноÑнÑе пÑогÑаммÑ, наÑÑÑаÑÑие "
-"непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни лÑдей
(оÑобенно деÑей). ÐÑоме Ñого, Ñ Ð½Ð¸Ñ
"
-"болÑÑое колиÑеÑÑво пÑоÑеÑ
в заÑиÑе. Ðни <a
href=\"https://www.wired.com/"
-"story/kid-smartwatch-security-vulnerabilities/\"> позволÑÑÑ
взломÑикам "
-"заÑиÑÑ (и поÑÑоÑонним лÑдÑм) полÑÑиÑÑ
доÑÑÑп</a> к ÑаÑам."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"Таким обÑазом, поÑÑоÑонние
злоÑмÑÑленники могÑÑ Ð¿ÐµÑеÑ
ваÑÑваÑÑ
ÑообÑÐµÐ½Ð¸Ñ "
-"Ð¼ÐµÐ¶Ð´Ñ ÑодиÑелем и Ñебенком и подделÑваÑÑ
ÑообÑениÑ, оÑпÑавлÑемÑе из ÑаÑов и "
-"поÑÑлаемÑе в ÑаÑÑ, ÑÑо Ð¼Ð¾Ð¶ÐµÑ ÑоздаваÑÑ
опаÑноÑÑÑ Ð´Ð»Ñ Ñебенка."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе Ñлово
“<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">Ñ
акеÑÑ</a>” невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
-"обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -508,6 +490,49 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">coerces players to spend money by overwhelming the game "
+#~ "play with loot boxes</a>."
+#~ msgstr ""
+#~ "ÐÑзÑваÑÑÐ°Ñ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ Ð¸Ð³Ñа Genshin Impact
неÑÑÑанно <a href=\"https://"
+#~ "www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-"
+#~ "taking-over-the-world\">пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¸Ð³Ñоков ÑÑаÑиÑÑ
денÑги, загÑÐ¾Ð¼Ð¾Ð¶Ð´Ð°Ñ "
+#~ "игÑÑ Ð»ÑÑбокÑами</a>."
+
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\"> permit security breakers (and unauthorized "
+#~ "people) to access</a> the watch."
+#~ msgstr ""
+#~ "ÐаÑÑÑнÑе ÑаÑÑ Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑением к
ÐнÑеÑнеÑÑ, ÑабоÑаÑÑие под ÑпÑавлением "
+#~ "неÑвободнÑÑ
пÑогÑамм, ÑодеÑжаÑ
вÑедоноÑнÑе пÑогÑаммÑ, наÑÑÑаÑÑие "
+#~ "непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни лÑдей
(оÑобенно деÑей). ÐÑоме Ñого, Ñ Ð½Ð¸Ñ
"
+#~ "болÑÑое колиÑеÑÑво пÑоÑеÑ
в заÑиÑе. Ðни
<a href=\"https://www.wired.com/"
+#~ "story/kid-smartwatch-security-vulnerabilities/\"> позволÑÑÑ
взломÑикам "
+#~ "заÑиÑÑ (и поÑÑоÑонним лÑдÑм) полÑÑиÑÑ
доÑÑÑп</a> к ÑаÑам."
+
+#~ msgid ""
+#~ "Thus, ill-intentioned unauthorized people can intercept communications "
+#~ "between parent and child and spoof messages to and from the watch, "
+#~ "possibly endangering the child."
+#~ msgstr ""
+#~ "Таким обÑазом, поÑÑоÑонние
злоÑмÑÑленники могÑÑ Ð¿ÐµÑеÑ
ваÑÑваÑÑ
ÑообÑÐµÐ½Ð¸Ñ "
+#~ "Ð¼ÐµÐ¶Ð´Ñ ÑодиÑелем и Ñебенком и
подделÑваÑÑ ÑообÑениÑ, оÑпÑавлÑемÑе из
ÑаÑов "
+#~ "и поÑÑлаемÑе в ÑаÑÑ, ÑÑо Ð¼Ð¾Ð¶ÐµÑ ÑоздаваÑÑ
опаÑноÑÑÑ Ð´Ð»Ñ Ñебенка."
+
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе
Ñлово “<a href=\"/philosophy/"
+#~ "words-to-avoid.html#Hacker\">Ñ
акеÑÑ</a>” невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
+#~ "обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
+
+#~ msgid ""
#~ "Roblox (among many other games) created anti-features which sucker "
#~ "children into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-"
#~ "kids-spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-"
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary.tr.po 10 Nov 2020 17:37:55 -0000 1.73
+++ proprietary.tr.po 14 Nov 2020 09:33:01 -0000 1.74
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-10 18:36+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.1\n"
@@ -86,9 +87,14 @@
"Modern özel mülk yazılımın genellikle sahip olduÄu bir yoldur."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Eylül 2020 itibarıyla bu dizindeki sayfalar (destekleyen 540'tan fazla "
@@ -313,6 +319,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -379,52 +404,6 @@
"için, örneÄin satın aldıkları bir ürünü abone olunmuÅ bir ürüne
dönüÅtürmek "
"gibi, kullanılabilir."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-"BaÄımlılık yapan Genshin Impact amansız bir Åekilde <a
href=\"https://www."
-"theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
-"over-the-world\">oyunu hazine sandıklarına boÄarak oyuncuları para
harcamaya "
-"zorluyor</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"Ãzel mülk yazılım içeren Ä°nternet eriÅimli saatler kötücüldür,
insanların "
-"(özellikle de çocukların) gizliliÄini ihlal ederler. Ãstelik bir çok "
-"güvenlik açıÄı da içerirler. Bunlar saate <a
href=\"https://www.wired.com/"
-"story/kid-smartwatch-security-vulnerabilities/\"> güvenlik kırıcıların
(ve "
-"yetkisiz kiÅilerin) eriÅimine olanak verir</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"Böylece, kötü niyetli yetkisiz kiÅiler ebeveyn ve çocuk arasındaki
iletiÅime "
-"dahil olup, muhtemelen çocuÄu tehlikeye atacak Åekilde saate gelen ve
giden "
-"mesajları ele geçirebilirler."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>(Bu yazının “<a href=\"/philosophy/words-to-avoid.html#Hacker"
-"\">üstât (hacker)</a>” kelimesini “güvenlik kırıcı” "
-"anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +485,48 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">coerces players to spend money by overwhelming the game "
+#~ "play with loot boxes</a>."
+#~ msgstr ""
+#~ "BaÄımlılık yapan Genshin Impact amansız bir Åekilde <a
href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">oyunu hazine sandıklarına boÄarak oyuncuları para "
+#~ "harcamaya zorluyor</a>."
+
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\"> permit security breakers (and unauthorized "
+#~ "people) to access</a> the watch."
+#~ msgstr ""
+#~ "Ãzel mülk yazılım içeren Ä°nternet eriÅimli saatler kötücüldür,
insanların "
+#~ "(özellikle de çocukların) gizliliÄini ihlal ederler. Ãstelik bir çok
"
+#~ "güvenlik açıÄı da içerirler. Bunlar saate <a
href=\"https://www.wired.com/"
+#~ "story/kid-smartwatch-security-vulnerabilities/\"> güvenlik
kırıcıların "
+#~ "(ve yetkisiz kiÅilerin) eriÅimine olanak verir</a>."
+
+#~ msgid ""
+#~ "Thus, ill-intentioned unauthorized people can intercept communications "
+#~ "between parent and child and spoof messages to and from the watch, "
+#~ "possibly endangering the child."
+#~ msgstr ""
+#~ "Böylece, kötü niyetli yetkisiz kiÅiler ebeveyn ve çocuk arasındaki "
+#~ "iletiÅime dahil olup, muhtemelen çocuÄu tehlikeye atacak Åekilde saate
"
+#~ "gelen ve giden mesajları ele geçirebilirler."
+
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "<small>(Bu yazının “<a
href=\"/philosophy/words-to-avoid.html#Hacker"
+#~ "\">üstât (hacker)</a>” kelimesini “güvenlik
kırıcı” "
+#~ "anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
+
+#~ msgid ""
#~ "Roblox (among many other games) created anti-features which sucker "
#~ "children into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-"
#~ "kids-spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-"
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.zh-cn.po 11 Nov 2020 10:00:02 -0000 1.82
+++ proprietary.zh-cn.po 14 Nov 2020 09:33:01 -0000 1.83
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-11-11 17:28+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-14 09:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -80,9 +81,14 @@
"çåå¨ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"æªè³ 2020 å¹´ 9 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 450
个æ¶æåè½å®ä¾ï¼æ 540 å¤ä»½è¯"
@@ -294,6 +300,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -353,47 +378,6 @@
"è£
åä½¿ç¨ Windows
æä½ç³»ç»ââä¸ä¸ªæ¶æ软件ãè¿ç§è´¦å·å¯ä»¥ç¨æ¥çæ§ç¨æ·å¹¶ä¸/æè
è¿"
"æå¤ç§è¿å人们æå©çæ¹å¼ï¼æ¯å¦æ人们è´ä¹°ç软件åæ订é
ç软件ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-"带ææç¾æ§è´¨ç Genshin Impact æ ä¼æ¢å° <a
href=\"https://www.theguardian.com/"
-"games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world\">è¿«"
-"使ç©å®¶å¨éå
·ä¸è±è´¹éé±</a>ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"带æäºèç½åè½çæ表ï¼å¦ææ¯ä¸æ软件ï¼é£ä¹å°±æ¯æ¶æ软件ãæ¤å¤ï¼å®ä»¬æ诸å¤å®å
¨"
-"æ¼æ´ãå®ä»¬ä¼ <a
href=\"https://www.wired.com/story/kid-smartwatch-security-"
-"vulnerabilities/\">è®©ç ´åè
ï¼æªç»ææç人ï¼è®¿é®</a> æ表ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"å
æ¤ï¼æææ¶æçæªç»ææç人å¯ä»¥æ¦æªå©åä¸å®¶é¿ç对è¯ï¼ä»¥åå
æ¢æ表åéåæ¥æ¶"
-"çæ¶æ¯ï¼å¾å¯è½è®©å©åå¤äºå±é©ä¹ä¸ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° “<a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">é»å®¢</a>” ä¸è¯å½æ “éªå®¢”
æ¥ç¨ãï¼</small>"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -478,6 +462,43 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
+#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
+#~ "over-the-world\">coerces players to spend money by overwhelming the game "
+#~ "play with loot boxes</a>."
+#~ msgstr ""
+#~ "带ææç¾æ§è´¨ç Genshin Impact æ ä¼æ¢å° <a
href=\"https://www.theguardian."
+#~ "com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-"
+#~ "world\">迫使ç©å®¶å¨éå
·ä¸è±è´¹éé±</a>ã"
+
+#~ msgid ""
+#~ "Internet-enabled watches with proprietary software are malware, violating "
+#~ "people (specially children's) privacy. In addition, they have a lot of "
+#~ "security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\"> permit security breakers (and unauthorized "
+#~ "people) to access</a> the watch."
+#~ msgstr ""
+#~
"带æäºèç½åè½çæ表ï¼å¦ææ¯ä¸æ软件ï¼é£ä¹å°±æ¯æ¶æ软件ãæ¤å¤ï¼å®ä»¬æ诸å¤å®"
+#~ "å
¨æ¼æ´ãå®ä»¬ä¼ <a
href=\"https://www.wired.com/story/kid-smartwatch-"
+#~ "security-vulnerabilities/\">è®©ç ´åè
ï¼æªç»ææç人ï¼è®¿é®</a>
æ表ã"
+
+#~ msgid ""
+#~ "Thus, ill-intentioned unauthorized people can intercept communications "
+#~ "between parent and child and spoof messages to and from the watch, "
+#~ "possibly endangering the child."
+#~ msgstr ""
+#~ "å
æ¤ï¼æææ¶æçæªç»ææç人å¯ä»¥æ¦æªå©åä¸å®¶é¿ç对è¯ï¼ä»¥åå
æ¢æ表åéåæ¥"
+#~ "æ¶çæ¶æ¯ï¼å¾å¯è½è®©å©åå¤äºå±é©ä¹ä¸ã"
+
+#~ msgid ""
+#~ "<small>(Note that this article misuses the word “<a href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">hackers</a>” to mean “"
+#~ "crackers.”)</small>"
+#~ msgstr ""
+#~ "<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° “<a
href=\"/philosophy/words-to-avoid."
+#~ "html#Hacker\">é»å®¢</a>” ä¸è¯å½æ “éªå®¢”
æ¥ç¨ãï¼</small>"
+
+#~ msgid ""
#~ "Roblox (among many other games) created anti-features which sucker "
#~ "children into <a href=\"https://www.theguardian.com/money/2020/mar/11/my-"
#~ "kids-spent-600-on-their-ipads-without-my-knowledge\"> utilizing third-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary.zh-tw-diff.html 10 Nov 2020 11:02:55 -0000 1.181
+++ proprietary.zh-tw-diff.html 14 Nov 2020 09:33:02 -0000 1.182
@@ -109,8 +109,8 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 540 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>November,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 550 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks and creditors deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets deactivated, it will
+ be limited to basic functionality, such as emergency calling and
+ access to settings.</p>
+ </li>
+
+ <li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to create an account
on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is imposing surveillance on people and
+ violating their privacy.</p>
+ </li>
+
<li id="M202006120">
<p>The company behind Zoom does not only deny
users' computer freedom by developing this piece
@@ -248,27 +266,6 @@
be used for surveillance and/or violating people's rights in many ways,
such as turning their purchased software to a subscription
product.</p>
</li>
-
- <li id="M202010220">
- <p>The addictive Genshin Impact relentlessly <a
-
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world">coerces
- players to spend money by overwhelming the game play with loot
- boxes</a>.</p>
- </li>
-
- <li id="M202009100">
- <p>Internet-enabled watches with proprietary software
- are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
-
- <p><small>(Note that this article misuses the word “<a
- href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
- </li>
</ul>
</div></em></ins></span>
@@ -332,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/10 11:02:55 $
+$Date: 2020/11/14 09:33:02 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary.zh-tw.po 10 Nov 2020 11:02:55 -0000 1.191
+++ proprietary.zh-tw.po 14 Nov 2020 09:33:02 -0000 1.192
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-10 10:56+0000\n"
+"POT-Creation-Date: 2020-11-14 09:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -89,9 +89,9 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+450+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2017,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -99,8 +99,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -443,6 +443,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The company behind Zoom does not only deny users' computer freedom by "
"developing this piece of nonfree software, it also violates users' civil "
"rights by <a href=\"https://www.theverge.com/2020/6/12/21288995/zoom-"
@@ -484,37 +503,6 @@
"purchased software to a subscription product."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The addictive Genshin Impact relentlessly <a href=\"https://www.theguardian."
-"com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world"
-"\">coerces players to spend money by overwhelming the game play with loot "
-"boxes</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- pt-br.po 10 Nov 2020 17:37:44 -0000 1.295
+++ pt-br.po 14 Nov 2020 09:33:02 -0000 1.296
@@ -4217,6 +4217,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -5063,6 +5072,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -8627,8 +8646,8 @@
#| "of malicious functionalities (with more than 520 references to back them "
#| "up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Até janeiro de 2020, as páginas neste diretório listam quase 450 exemplos
de "
@@ -8859,35 +8878,6 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>Note: this article uses the word “free” in the sense "
-#| "of “gratis.”</small>"
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
-"sentido de âgrátisâ.</small>"
-
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -9735,6 +9725,35 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>Nota: este artigo faz uso da palavra â<i lang=\"en\">free</i>â no "
+"sentido de âgrátisâ.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -10144,6 +10163,21 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of July, 2020, the pages in this directory list around 450 instances "
+#~| "of malicious functionalities (with more than 520 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até janeiro de 2020, as páginas neste diretório listam quase 450
exemplos "
+#~ "de funcionalidades maliciosas (com mais de 520 referências para
confirmá-"
+#~ "las), mas com certeza há mais milhares das quais nós não temos "
+#~ "conhecimento."
+
#~ msgid ""
#~ "Sony has brought back its robotic pet Aibo, this time <a href=\"https://"
#~ "motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.504
retrieving revision 1.505
diff -u -b -r1.504 -r1.505
--- ru.po 10 Nov 2020 17:37:44 -0000 1.504
+++ ru.po 14 Nov 2020 09:33:02 -0000 1.505
@@ -5143,6 +5143,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -6240,6 +6249,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -10522,9 +10541,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-September,-] {+November,+} 2020, the pages in this directory list
+# | around 450 instances of malicious functionalities (with more than
+# | 5[-4-]{+5+}0 references to back them up), but there are surely thousands
+# | more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"Ðа ÑенÑÑбÑÑ 2020 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 450 "
@@ -10749,41 +10777,6 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"ÐаÑÑÑнÑе ÑаÑÑ Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑением к ÐнÑеÑнеÑÑ,
ÑабоÑаÑÑие под ÑпÑавлением "
-"неÑвободнÑÑ
пÑогÑамм, ÑодеÑжаÑ
вÑедоноÑнÑе пÑогÑаммÑ, наÑÑÑаÑÑие "
-"непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни лÑдей
(оÑобенно деÑей). ÐÑоме Ñого, Ñ Ð½Ð¸Ñ
"
-"болÑÑое колиÑеÑÑво пÑоÑеÑ
в заÑиÑе. Ðни <a
href=\"https://www.wired.com/"
-"story/kid-smartwatch-security-vulnerabilities/\"> позволÑÑÑ
взломÑикам "
-"заÑиÑÑ (и поÑÑоÑонним лÑдÑм) полÑÑиÑÑ
доÑÑÑп</a> к ÑаÑам."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"Таким обÑазом, поÑÑоÑонние
злоÑмÑÑленники могÑÑ Ð¿ÐµÑеÑ
ваÑÑваÑÑ
ÑообÑÐµÐ½Ð¸Ñ "
-"Ð¼ÐµÐ¶Ð´Ñ ÑодиÑелем и Ñебенком и подделÑваÑÑ
ÑообÑениÑ, оÑпÑавлÑемÑе из ÑаÑов и "
-"поÑÑлаемÑе в ÑаÑÑ, ÑÑо Ð¼Ð¾Ð¶ÐµÑ ÑоздаваÑÑ
опаÑноÑÑÑ Ð´Ð»Ñ Ñебенка."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе Ñлово
“<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">Ñ
акеÑÑ</a>” невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
-"обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11773,6 +11766,41 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+"ÐаÑÑÑнÑе ÑаÑÑ Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑением к ÐнÑеÑнеÑÑ,
ÑабоÑаÑÑие под ÑпÑавлением "
+"неÑвободнÑÑ
пÑогÑамм, ÑодеÑжаÑ
вÑедоноÑнÑе пÑогÑаммÑ, наÑÑÑаÑÑие "
+"непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни лÑдей
(оÑобенно деÑей). ÐÑоме Ñого, Ñ Ð½Ð¸Ñ
"
+"болÑÑое колиÑеÑÑво пÑоÑеÑ
в заÑиÑе. Ðни <a
href=\"https://www.wired.com/"
+"story/kid-smartwatch-security-vulnerabilities/\"> позволÑÑÑ
взломÑикам "
+"заÑиÑÑ (и поÑÑоÑонним лÑдÑм) полÑÑиÑÑ
доÑÑÑп</a> к ÑаÑам."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+"Таким обÑазом, поÑÑоÑонние
злоÑмÑÑленники могÑÑ Ð¿ÐµÑеÑ
ваÑÑваÑÑ
ÑообÑÐµÐ½Ð¸Ñ "
+"Ð¼ÐµÐ¶Ð´Ñ ÑодиÑелем и Ñебенком и подделÑваÑÑ
ÑообÑениÑ, оÑпÑавлÑемÑе из ÑаÑов и "
+"поÑÑлаемÑе в ÑаÑÑ, ÑÑо Ð¼Ð¾Ð¶ÐµÑ ÑоздаваÑÑ
опаÑноÑÑÑ Ð´Ð»Ñ Ñебенка."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>ÐбÑаÑиÑе внимание, ÑÑо в ÑÑаÑÑе Ñлово
“<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">Ñ
акеÑÑ</a>” невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
+"обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -12198,6 +12226,15 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Ðа ÑенÑÑбÑÑ 2020 года на ÑÑÑаниÑаÑ
ÑÑого каÑалога пеÑеÑиÑлено около "
+#~ "450 пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более
540 ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), "
+#~ "но еÑÑÑ, беÑÑпоÑно, ÑÑÑÑÑи дÑÑгиÑ
, о
коÑоÑÑÑ
Ð¼Ñ Ð½Ðµ знаем."
+
#~ msgid "First item"
#~ msgstr "ÐеÑÐ²Ð°Ñ ÑÑаÑÑÑ"
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- tr.po 10 Nov 2020 18:02:45 -0000 1.78
+++ tr.po 14 Nov 2020 09:33:02 -0000 1.79
@@ -3744,6 +3744,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -4505,6 +4514,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -7647,15 +7666,15 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of August, 2020, the pages in this directory list around 450 instances "
-#| "of malicious functionalities (with more than 530 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
-"AÄustos 2020 itibarıyla bu dizindeki sayfalar (destekleyen 530'tan fazla "
+"Eylül 2020 itibarıyla bu dizindeki sayfalar (destekleyen 540'tan fazla "
"referansla birlikte) yaklaÅık 450 kötücül iÅlevsellik örneÄini
listeliyor, "
"ancak muhakkak henüz bilmediÄimiz binlercesi vardır."
@@ -7875,40 +7894,6 @@
msgid "Latest additions"
msgstr "Son eklenenler"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"Ãzel mülk yazılım içeren Ä°nternet eriÅimli saatler kötücüldür,
insanların "
-"(özellikle de çocukların) gizliliÄini ihlal ederler. Ãstelik bir çok "
-"güvenlik açıÄı da içerirler. Bunlar saate <a
href=\"https://www.wired.com/"
-"story/kid-smartwatch-security-vulnerabilities/\"> güvenlik kırıcıların
(ve "
-"yetkisiz kiÅilerin) eriÅimine olanak verir</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"Böylece, kötü niyetli yetkisiz kiÅiler ebeveyn ve çocuk arasındaki
iletiÅime "
-"dahil olup, muhtemelen çocuÄu tehlikeye atacak Åekilde saate gelen ve
giden "
-"mesajları ele geçirebilirler."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-"<small>(Bu yazının “<a href=\"/philosophy/words-to-avoid.html#Hacker"
-"\">üstât (hacker)</a>” kelimesini “güvenlik kırıcı” "
-"anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
-
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8734,6 +8719,40 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+"Ãzel mülk yazılım içeren Ä°nternet eriÅimli saatler kötücüldür,
insanların "
+"(özellikle de çocukların) gizliliÄini ihlal ederler. Ãstelik bir çok "
+"güvenlik açıÄı da içerirler. Bunlar saate <a
href=\"https://www.wired.com/"
+"story/kid-smartwatch-security-vulnerabilities/\"> güvenlik kırıcıların
(ve "
+"yetkisiz kiÅilerin) eriÅimine olanak verir</a>."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+"Böylece, kötü niyetli yetkisiz kiÅiler ebeveyn ve çocuk arasındaki
iletiÅime "
+"dahil olup, muhtemelen çocuÄu tehlikeye atacak Åekilde saate gelen ve
giden "
+"mesajları ele geçirebilirler."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+"<small>(Bu yazının “<a href=\"/philosophy/words-to-avoid.html#Hacker"
+"\">üstât (hacker)</a>” kelimesini “güvenlik kırıcı” "
+"anlamında yanlıŠkullandıÄını belirtmek isteriz)</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -9105,6 +9124,20 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of August, 2020, the pages in this directory list around 450 "
+#~| "instances of malicious functionalities (with more than 530 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "AÄustos 2020 itibarıyla bu dizindeki sayfalar (destekleyen 530'tan fazla
"
+#~ "referansla birlikte) yaklaÅık 450 kötücül iÅlevsellik örneÄini "
+#~ "listeliyor, ancak muhakkak henüz bilmediÄimiz binlercesi vardır."
+
#~ msgid ""
#~ "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- zh-cn.po 11 Nov 2020 10:00:02 -0000 1.74
+++ zh-cn.po 14 Nov 2020 09:33:02 -0000 1.75
@@ -3676,6 +3676,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -4428,6 +4437,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -7426,15 +7445,15 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of August, 2020, the pages in this directory list around 450 instances "
-#| "of malicious functionalities (with more than 530 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of September, 2020, the pages in this directory list around 450 "
+#| "instances of malicious functionalities (with more than 540 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
-"æªè³ 2020 å¹´ 8 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 450
个æ¶æåè½å®ä¾ï¼æ 530 å¤ä»½è¯"
+"æªè³ 2020 å¹´ 9 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 450
个æ¶æåè½å®ä¾ï¼æ 540 å¤ä»½è¯"
"æ®æ¯æï¼ï¼ä½æ¯è¯å®è¿ææ°å个æ们ä¸ç¥éæ
åµã"
#. type: Content of: <div><table><tr><th>
@@ -7642,38 +7661,6 @@
msgid "Latest additions"
msgstr "ææ°æ·»å "
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-"带æäºèç½åè½çæ表ï¼å¦ææ¯ä¸æ软件ï¼é£ä¹å°±æ¯æ¶æ软件ãæ¤å¤ï¼å®ä»¬æ诸å¤å®å
¨"
-"æ¼æ´ãå®ä»¬ä¼ <a
href=\"https://www.wired.com/story/kid-smartwatch-security-"
-"vulnerabilities/\">è®©ç ´åè
ï¼æªç»ææç人ï¼è®¿é®</a> æ表ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-"å
æ¤ï¼æææ¶æçæªç»ææç人å¯ä»¥æ¦æªå©åä¸å®¶é¿ç对è¯ï¼ä»¥åå
æ¢æ表åéåæ¥æ¶"
-"çæ¶æ¯ï¼å¾å¯è½è®©å©åå¤äºå±é©ä¹ä¸ã"
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>Note: this article uses the word “free” in the sense "
-#| "of “gratis.”</small>"
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr "<small>注ï¼è¿ç¯æç« ä¸âfreeâçæææ¯âå
è´¹çâã</small>"
-
#
#
#
@@ -8487,6 +8474,38 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+"带æäºèç½åè½çæ表ï¼å¦ææ¯ä¸æ软件ï¼é£ä¹å°±æ¯æ¶æ软件ãæ¤å¤ï¼å®ä»¬æ诸å¤å®å
¨"
+"æ¼æ´ãå®ä»¬ä¼ <a
href=\"https://www.wired.com/story/kid-smartwatch-security-"
+"vulnerabilities/\">è®©ç ´åè
ï¼æªç»ææç人ï¼è®¿é®</a> æ表ã"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+"å
æ¤ï¼æææ¶æçæªç»ææç人å¯ä»¥æ¦æªå©åä¸å®¶é¿ç对è¯ï¼ä»¥åå
æ¢æ表åéåæ¥æ¶"
+"çæ¶æ¯ï¼å¾å¯è½è®©å©åå¤äºå±é©ä¹ä¸ã"
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<small>Note: this article uses the word “free” in the sense "
+#| "of “gratis.”</small>"
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr "<small>注ï¼è¿ç¯æç« ä¸âfreeâçæææ¯âå
è´¹çâã</small>"
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -8903,6 +8922,19 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of August, 2020, the pages in this directory list around 450 "
+#~| "instances of malicious functionalities (with more than 530 references to "
+#~| "back them up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "æªè³ 2020 å¹´ 8 æï¼æ¤ç®å½ç页é¢ä¸ååºäºå¤§çº¦ 450
个æ¶æåè½å®ä¾ï¼æ 530 å¤"
+#~ "份è¯æ®æ¯æï¼ï¼ä½æ¯è¯å®è¿ææ°å个æ们ä¸ç¥éæ
åµã"
+
#~ msgid ""
#~ "Occulus headsets <a href=\"https://www.theverge.com/2020/8/18/21372435/"
#~ "oculus-facebook-login-change-separate-account-support-end-quest-october"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- zh-tw.po 10 Nov 2020 17:37:44 -0000 1.231
+++ zh-tw.po 14 Nov 2020 09:33:02 -0000 1.232
@@ -3687,6 +3687,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"A new app published by Google <a href=\"https://www.xda-developers.com/"
+"google-device-lock-controller-banks-payments/\">lets banks and creditors "
+"deactivate people's Android devices</a> if they fail to make payments. If "
+"someone's device gets deactivated, it will be limited to basic "
+"functionality, such as emergency calling and access to settings."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google has long had <a href=\"http://www.theguardian.com/technology/2015/"
"nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted\">a "
"back door to remotely unlock an Android device</a>, unless its disk is "
@@ -4421,6 +4430,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+"all/why-does-my-new-e-mail-account-need-a-phone-"
+"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+"phone number</a> in order to create an account on the company's network. On "
+"top of mistreating their users by providing nonfree software, Microsoft is "
+"imposing surveillance on people and violating their privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Windows 10 telemetry program sends information to Microsoft about the user's "
"computer and their use of the computer."
msgstr ""
@@ -7433,9 +7452,9 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+September, 2020,+} the [-files-] {+pages+} in
-# | this directory list around [-300-] {+450+} instances of malicious
-# | [-functionalities,-] {+functionalities (with more than 540 references to
+# | As of [-April, 2017,-] {+November, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 550 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -7443,8 +7462,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2020, the pages in this directory list around 450 instances "
-"of malicious functionalities (with more than 540 references to back them "
+"As of November, 2020, the pages in this directory list around 450 instances "
+"of malicious functionalities (with more than 550 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -7785,29 +7804,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Internet-enabled watches with proprietary software are malware, violating "
-"people (specially children's) privacy. In addition, they have a lot of "
-"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
-"security-vulnerabilities/\"> permit security breakers (and unauthorized "
-"people) to access</a> the watch."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Thus, ill-intentioned unauthorized people can intercept communications "
-"between parent and child and spoof messages to and from the watch, possibly "
-"endangering the child."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
-"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
-"”)</small>"
-msgstr ""
-
#
#
#
@@ -8641,6 +8637,29 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Internet-enabled watches with proprietary software are malware, violating "
+"people (specially children's) privacy. In addition, they have a lot of "
+"security flaws. They <a href=\"https://www.wired.com/story/kid-smartwatch-"
+"security-vulnerabilities/\"> permit security breakers (and unauthorized "
+"people) to access</a> the watch."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Thus, ill-intentioned unauthorized people can intercept communications "
+"between parent and child and spoof messages to and from the watch, possibly "
+"endangering the child."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<small>(Note that this article misuses the word “<a href=\"/philosophy/"
+"words-to-avoid.html#Hacker\">hackers</a>” to mean “crackers."
+"”)</small>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very cheap “smart watch” comes with an Android app <a href="
"\"https://www.theregister.co.uk/2016/03/02/"
"chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/\"> that connects "
@@ -9142,6 +9161,19 @@
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
#~ msgid ""
+#~ "As of September, 2020, the pages in this directory list around 450 "
+#~ "instances of malicious functionalities (with more than 540 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°"
+#~ "éæä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
#~ "As of August, 2020, the pages in this directory list around 450 instances "
#~ "of malicious functionalities (with more than 530 references to back them "
#~ "up), but there are surely thousands more we don't know about."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/02
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/16
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/25