[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 16 Nov 2020 11:04:06 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/16 11:04:05
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.409&r2=1.410
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.558&r2=1.559
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.365&r2=1.366
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.347&r2=1.348
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.644&r2=1.645
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.189&r2=1.190
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.339&r2=1.340
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.201&r2=1.202
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.337&r2=1.338
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.505&r2=1.506
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.232&r2=1.233
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- de.po 14 Nov 2020 09:32:55 -0000 1.232
+++ de.po 16 Nov 2020 16:03:56 -0000 1.233
@@ -7369,9 +7369,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- es.po 15 Nov 2020 10:59:57 -0000 1.332
+++ es.po 16 Nov 2020 16:03:57 -0000 1.333
@@ -7215,13 +7215,29 @@
msgstr "Casi seguro eso quiere decir que puede hacerlo."
#. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
@@ -14174,6 +14190,21 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">obliga a la gente a dar el "
+#~ "número de teléfono</a> cuando crean una cuenta en la red de la
compañÃa. "
+#~ "Además de maltratar a los usuarios proporcionándoles software que no es "
+#~ "libre, Microsoft impone su vigilancia y viola la privacidad de la gente."
+
#, fuzzy
#~| msgid ""
#~| "As of August, 2020, the pages in this directory list around 450 "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.409
retrieving revision 1.410
diff -u -b -r1.409 -r1.410
--- fr.po 14 Nov 2020 10:29:13 -0000 1.409
+++ fr.po 16 Nov 2020 16:03:57 -0000 1.410
@@ -6293,13 +6293,29 @@
msgstr "Cela signifie sûrement qu'il en a la possibilité."
#. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
@@ -12292,3 +12308,19 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">force les gens à donner "
+#~ "leur numéro de téléphone</a> pour créer un compte sur son réseau. Non
"
+#~ "seulement Microsoft nuit à ses utilisateurs en leur fournissant du "
+#~ "logiciel non libre, mais elle leur impose sa surveillance et viole leur "
+#~ "vie privée."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- it.po 14 Nov 2020 09:32:56 -0000 1.232
+++ it.po 16 Nov 2020 16:03:58 -0000 1.233
@@ -6884,9 +6884,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- ja.po 14 Nov 2020 09:32:56 -0000 1.240
+++ ja.po 16 Nov 2020 16:03:58 -0000 1.241
@@ -5393,9 +5393,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-microsoft.de-diff.html 14 Nov 2020 09:32:57 -0000 1.58
+++ malware-microsoft.de-diff.html 16 Nov 2020 16:03:58 -0000 1.59
@@ -384,8 +384,8 @@
program</a> on computers running certain
versions of Windows 10. Remediation, in Microsoft's view, means <a
href="https://support.microsoft.com/en-us/help/4023057/update-reliability-for-windows-10-versions-1507-to-1909">
- tampering with users' settings and files</a>,
notably</em></ins></span> to
- <span class="inserted"><ins><em>“repair” any components of the
updating system that users
+ tampering with users' settings and files</a>, notably to
+ “repair” any components of the updating system that users
may have intentionally disabled, and thus regain full power over
them. Microsoft repeatedly pushed faulty versions of this program to
users' machines, causing numerous problems, some of which <a
@@ -394,7 +394,7 @@
<p>This exemplifies the arrogant and manipulative attitude
that proprietary software developers have learned to adopt
- toward the people they are supposedly serving. Migrate to a <a
+ toward the people they are supposedly serving. Migrate</em></ins></span>
to <span class="inserted"><ins><em>a <a
href="/distros/free-distros.html">free operating system</a> if you
can!</p>
@@ -605,40 +605,33 @@
<span
class="inserted"><ins><em>href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking</em></ins></span>
users to <span class="removed"><del><strong>buy subscriptions for the
OneDrive service.</p></li>
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft</strong></del></span>
- <span class="inserted"><ins><em>and use the Windows operating system,
which is malware. The account can
+<li>In order</strong></del></span> <span
class="inserted"><ins><em>create an account on their network</a> to be
able</em></ins></span> to <span class="removed"><del><strong>increase Windows
10's</strong></del></span> install <span class="removed"><del><strong>base,
Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice</strong></del></span>
+ and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>use the Windows operating system, which is malware.
The account can
be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
+ such as turning their purchased software to a subscription
product.</p></em></ins></span>
</li>
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+<span class="removed"><del><strong><li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
+ <p>Microsoft recorded</em></ins></span> users <span
class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>of Xboxes and had <a
+
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span>
- <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
+ <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span
class="removed"><del><strong>repeatedly</strong></del></span>
+ <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p>
</li>
-<span class="removed"><del><strong><li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
-users obnoxiously and repeatedly</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908151">
+ <li id="M201908151">
<p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>install Windows 10</a>.</p></li>
- <li><p>Microsoft
- <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking
- users</a></strong></del></span> <span
class="inserted"><ins><em>say whether it can</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
-into replacing Windows 7 with Windows 10</a>.</p></li>
-
- <li><p>Microsoft has made companies' Windows machines managed by
the
-company's
-sysadmins</strong></del></span>
+ users</a></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
@@ -646,11 +639,16 @@
</li>
<li id="M201905281">
- <p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
-users</strong></del></span>
+ <p>Microsoft</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+into replacing Windows 7 with Windows 10</a>.</p></li>
+
+ <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in
order</em></ins></span> to <span class="inserted"><ins><em>create an account
on</em></ins></span>
- the <span class="removed"><del><strong>sysadmins about not
“upgrading” to Windows
+ people to give their phone number</a> in order to be able to create
an account on</em></ins></span>
+ the company's
+<span class="removed"><del><strong>sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue</strong></del></span>
<span class="inserted"><ins><em>network. On top of mistreating
their</em></ins></span> users <span class="removed"><del><strong>to complain
to</strong></del></span> <span class="inserted"><ins><em>by providing
+ nonfree software, Microsoft is tracking their lives
outside</em></ins></span> the <span class="removed"><del><strong>sysadmins
about not “upgrading” to Windows
10</a>.</p></li>
</ul>
@@ -658,9 +656,8 @@
<ul>
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>computer and
+ violates their privacy.</p>
</li>
<li id="M201710134">
@@ -1021,7 +1018,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:32:57 $
+$Date: 2020/11/16 16:03:58 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- malware-microsoft.de.po 14 Nov 2020 09:32:57 -0000 1.154
+++ malware-microsoft.de.po 16 Nov 2020 16:03:58 -0000 1.155
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1027,9 +1027,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- malware-microsoft.es.po 15 Nov 2020 10:59:57 -0000 1.186
+++ malware-microsoft.es.po 16 Nov 2020 16:03:58 -0000 1.187
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -851,13 +852,29 @@
msgstr "Casi seguro eso quiere decir que puede hacerlo."
#. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- malware-microsoft.fr.po 14 Nov 2020 10:29:13 -0000 1.200
+++ malware-microsoft.fr.po 16 Nov 2020 16:03:58 -0000 1.201
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-11-14 11:25+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -850,13 +851,29 @@
msgstr "Cela signifie sûrement qu'il en a la possibilité."
#. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-microsoft.it-diff.html 14 Nov 2020 09:32:59 -0000 1.57
+++ malware-microsoft.it-diff.html 16 Nov 2020 16:03:58 -0000 1.58
@@ -643,8 +643,7 @@
<p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in
order</em></ins></span> to <span class="inserted"><ins><em>create an account
on</em></ins></span>
- the <span class="removed"><del><strong>sysadmins about not
“upgrading” to Windows
+ people</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in
order</em></ins></span> to <span class="removed"><del><strong>the sysadmins
about not “upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
10</a>.</p></li>
</ul>
@@ -652,9 +651,10 @@
<ul>
-<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+<li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>create an account on
+ the company's network. On top of mistreating their users by providing
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M201710134">
@@ -1008,7 +1008,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:32:59 $
+$Date: 2020/11/16 16:03:58 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- malware-microsoft.it.po 14 Nov 2020 09:32:59 -0000 1.159
+++ malware-microsoft.it.po 16 Nov 2020 16:03:58 -0000 1.160
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -980,9 +980,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- malware-microsoft.ja-diff.html 14 Nov 2020 09:32:59 -0000 1.72
+++ malware-microsoft.ja-diff.html 16 Nov 2020 16:03:58 -0000 1.73
@@ -616,10 +616,10 @@
<li id="M201905281">
<p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their</em></ins></span> users
<span class="removed"><del><strong>obnoxiously</strong></del></span> <span
class="inserted"><ins><em>by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M201710134">
@@ -982,7 +982,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:32:59 $
+$Date: 2020/11/16 16:03:58 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- malware-microsoft.ja.po 14 Nov 2020 09:32:59 -0000 1.139
+++ malware-microsoft.ja.po 16 Nov 2020 16:03:58 -0000 1.140
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -805,9 +805,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-microsoft.pot 14 Nov 2020 09:32:59 -0000 1.97
+++ malware-microsoft.pot 16 Nov 2020 16:03:58 -0000 1.98
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -588,10 +588,10 @@
msgid ""
"Microsoft <a "
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
-"people to give their phone number</a> in order to create an account on the "
-"company's network. On top of mistreating their users by providing nonfree "
-"software, Microsoft is imposing surveillance on people and violating their "
-"privacy."
+"people to give their phone number</a> in order to be able to create an "
+"account on the company's network. On top of mistreating their users by "
+"providing nonfree software, Microsoft is tracking their lives outside the "
+"computer and violates their privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- malware-microsoft.ru.po 14 Nov 2020 09:32:59 -0000 1.239
+++ malware-microsoft.ru.po 16 Nov 2020 16:03:59 -0000 1.240
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -851,9 +851,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- nl.po 14 Nov 2020 09:32:59 -0000 1.233
+++ nl.po 16 Nov 2020 16:03:59 -0000 1.234
@@ -4954,9 +4954,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- pl.po 14 Nov 2020 09:32:59 -0000 1.232
+++ pl.po 16 Nov 2020 16:03:59 -0000 1.233
@@ -4434,9 +4434,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- pot 14 Nov 2020 09:32:59 -0000 1.231
+++ pot 16 Nov 2020 16:03:59 -0000 1.232
@@ -4166,9 +4166,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary-surveillance.de-diff.html 14 Nov 2020 09:33:00 -0000
1.139
+++ proprietary-surveillance.de-diff.html 16 Nov 2020 16:03:59 -0000
1.140
@@ -2952,29 +2952,29 @@
at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication when
- accessed through</strong></del></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through the modem. However, even if it asked for
authentication, you couldn't be confident that Nissan has no
access. The software</strong></del></span> <span
class="inserted"><ins><em>present, but</em></ins></span> in the <span
class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
+ <p>Even if no one connects to the car
remotely,</strong></del></span> <span class="inserted"><ins><em>past (and, who
knows,
+ in</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
@@ -3204,67 +3204,66 @@
picked up by proprietary malware</strong></del></span> running <span
class="removed"><del><strong>on other devices in
range so as to determine that they are nearby. Once your
Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> with <span
class="removed"><del><strong>Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>proprietary
software.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903290">
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ correlate ads</strong></del></span> with <span
class="removed"><del><strong>Web activity,</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
</li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
+
+ <li id="M201903290">
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
+ <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data goes with
them</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
<span class="inserted"><ins><em><li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
- including car location. This feature operates even when the ignition
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
- give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
- <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201811300">
- <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
- cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward</em></ins></span> it <span class="removed"><del><strong>is done
- by free software</strong></del></span> <span class="inserted"><ins><em>to
the government-run platform.</p>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201810230">
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a></em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
-
- <p>In</strong></del></span> its <span
class="removed"><del><strong>privacy policy, Samsung explicitly
confirms</strong></del></span>
- <span class="inserted"><ins><em>“connected” cars, minute by
minute.</p>
-
- <p>GM did not get users' consent, but it could have
got</em></ins></span> that <span class="removed"><del><strong><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>easily by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
+ <span class="inserted"><ins><em><li id="M201810230">
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
+ <p>In its privacy policy, Samsung explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
<p>But if you really want</em></ins></span> to
@@ -3611,20 +3610,7 @@
code.</p>
</li>
- <span class="removed"><del><strong><li><p>Many web sites use
JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a form but not
- sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
-
- <li><p>Flash</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many web sites
use</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -3635,20 +3621,32 @@
<ul class="blurbs">
<li id="M201310110">
- <p>Flash</em></ins></span> and JavaScript are <span
class="removed"><del><strong>also</strong></del></span> used for <a
+ <p>Flash and</em></ins></span> JavaScript <span
class="removed"><del><strong>code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a form but not
+ sent</a>, in order to learn their identity.
Some</strong></del></span> are <span class="removed"><del><strong><a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a></strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> for <span
class="removed"><del><strong>this.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify users.</p>
+ “fingerprinting” devices</a> to identify
users.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+ <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
<span class="inserted"><ins><em><li id="M201003010">
- <p>Flash Player's <a
+ <p>Flash</em></ins></span> Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
</li>
-</ul></em></ins></span>
+
+ <span class="removed"><del><strong><li><p>Flash and JavaScript
are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify
users.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+<span class="inserted"><ins><em></ul></em></ins></span>
<div class="big-subsection">
@@ -3768,20 +3766,13 @@
<span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
proprietary software</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in order to create
an account on</em></ins></span>
- the
- <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company's network. On top of mistreating their
users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p></em></ins></span>
+ people to give their phone number</a> in order</em></ins></span> to
<span class="removed"><del><strong>make sure they can't “fool” the
+ monitoring</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902040">
- <p>Google invites people</em></ins></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will</strong></del></span> be able to <span
class="removed"><del><strong>listen for speech all</strong></del></span> <span
class="inserted"><ins><em>create an account on</em></ins></span>
+ the <span class="removed"><del><strong>time, even when
“off.”</a></p>
</li>
</ul>
@@ -3793,8 +3784,16 @@
<div style="clear: left;"></div>
<ul>
- <li><p>VR equipment, measuring every slight motion, creates the
- potential</strong></del></span> <span class="inserted"><ins><em>internet
use in their
+ <li><p>VR equipment, measuring every slight motion,
creates</strong></del></span> <span class="inserted"><ins><em>company's
network. On top of mistreating their users by providing
+ nonfree software, Microsoft is tracking their lives
outside</em></ins></span> the
+ <span class="removed"><del><strong>potential</strong></del></span> <span
class="inserted"><ins><em>computer and
+ violates their privacy.</p>
+ </li>
+
+ <li id="M201902040">
+ <p>Google invites people to <a
+
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
+ let Google monitor their phone use, and all internet use in their
homes,</em></ins></span> for <span class="inserted"><ins><em>an
extravagant payment of $20</a>.</p>
<p>This is not a malicious functionality of a program with some other
@@ -3890,7 +3889,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:00 $
+$Date: 2020/11/16 16:03:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary-surveillance.de.po 14 Nov 2020 09:33:00 -0000 1.353
+++ proprietary-surveillance.de.po 16 Nov 2020 16:03:59 -0000 1.354
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5636,9 +5636,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary-surveillance.es.po 15 Nov 2020 10:59:57 -0000 1.99
+++ proprietary-surveillance.es.po 16 Nov 2020 16:03:59 -0000 1.100
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-11-15 11:43+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -5062,13 +5063,29 @@
"\">#SpywareInNetworks</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.558
retrieving revision 1.559
diff -u -b -r1.558 -r1.559
--- proprietary-surveillance.fr.po 14 Nov 2020 10:29:13 -0000 1.558
+++ proprietary-surveillance.fr.po 16 Nov 2020 16:03:59 -0000 1.559
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-11-14 11:25+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5076,13 +5077,29 @@
"\">#SpywareInNetworks</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary-surveillance.it-diff.html 14 Nov 2020 09:33:00 -0000
1.205
+++ proprietary-surveillance.it-diff.html 16 Nov 2020 16:04:00 -0000
1.206
@@ -613,8 +613,7 @@
especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
- <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
- <p>With</strong></del></span> <span class="inserted"><ins><em>Biden's
app has a less manipulative overall
+ <p>The article says that Biden's app has a less manipulative overall
approach, but that does not tell us whether it has functionalities we
consider malicious, such as sending data the user has not explicitly
asked to send.</p>
@@ -623,14 +622,14 @@
<li id="M201601110">
<p>The natural extension of monitoring
people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps,
one</strong></del></span> <span class="inserted"><ins><em>software to make sure
they can't “fool”
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
the monitoring</a>.</p>
</li>
<li id="M201510050">
<p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>only hope</strong></del></span> <span
class="inserted"><ins><em>take over
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
them to turn the phones on and off, listen to the microphone,
retrieve geo-location data from the GPS, take photographs, read
@@ -644,7 +643,7 @@
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>this does not operate via
+ detail here, it seems that this does not operate via
the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
@@ -1442,17 +1441,20 @@
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
@@ -1472,14 +1474,16 @@
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
<p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
+ study found tens of thousands of pairs that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
<span class="inserted"><ins><em>collude</a>.</p>
</li>
<li id="M201703300">
@@ -1557,12 +1561,16 @@
five tracking libraries. Developers of this app have confirmed that
the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
- </dl>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -1570,109 +1578,102 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who is
+ in</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>pictures are
likely</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and
<span class="removed"><del><strong>Conditions” that spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the
service.</p></em></ins></span>
+ <p>If so, none of Facebook users' pictures</em></ins></span> are
<span class="removed"><del><strong>“consenting” to. Google should
clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>private anymore,
+ even if</em></ins></span> the <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them to the
service.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in
stores</strong></del></span> or <span class="removed"><del><strong>played by TV
programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p></em></ins></span>
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In
addition,</em></ins></span>
+ it <span class="removed"><del><strong>collects</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's conversations to serve them
with targeted
+ advertisements.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps</strong></del></span>
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy</em></ins></span> on <span class="removed"><del><strong>users,
instead</strong></del></span> <span class="inserted"><ins><em>many
sorts</em></ins></span> of <span class="removed"><del><strong>hiding
it</strong></del></span> <span class="inserted"><ins><em>data</em></ins></span>
in <span class="removed"><del><strong>an obscurely worded EULA.</p>
- <span class="inserted"><ins><em><li id="M201604250">
- <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal
- data to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>the
phone,</em></ins></span> and <span class="removed"><del><strong>other companies
from getting this personal information</strong></del></span> in <span
class="inserted"><ins><em>server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
<span class="inserted"><ins><em>include <a
+ <p>Apps that include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ such as Facebook, Google+ and Twitter.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ unrelated to</em></ins></span> the <span class="removed"><del><strong>first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component of Android)</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
<span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>personal
details of users</strong></del></span> <span class="inserted"><ins><em>500 most
popular gratis Android apps</a>.</p>
+ found in</em></ins></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
- <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
- </li>
-
- <li id="M201510300">
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a></em></ins></span>
of <span class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>is not enough
-to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>with
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
+ legitimate, but</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>that valid?
Software developers have no right</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when it's actually</strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are</em></ins></span>
doing <span class="removed"><del><strong>something else. Such a thing would be
almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>or how. “Analytics” tools
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>More</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510300">
+ <p>More</em></ins></span> than 73% <span
class="inserted"><ins><em>and 47%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android
<span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>and iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
+ personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
- <li id="M201508210">
- <p>Like</em></ins></span> most <span
class="removed"><del><strong>users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects</strong></del></span> <span
class="inserted"><ins><em>“music screaming” disservices, Spotify is
- based</em></ins></span> on <span class="removed"><del><strong>users,
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>proprietary
malware (DRM and snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-<p>However,</strong></del></span> <span class="inserted"><ins><em><a
+ <span class="inserted"><ins><em><li id="M201508210">
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>some are
starting
+ demanded users submit</em></ins></span> to <span
class="inserted"><ins><em>increased snooping</a>, and some are starting
to realize that it is nasty.</p>
- <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android)</strong></del></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span>
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span
class="inserted"><ins><em>“serve”
- users better</a>—never mind whether they want
that.</em></ins></span> This is
- <span class="removed"><del><strong>yet another</strong></del></span> <span
class="inserted"><ins><em>a
- typical</em></ins></span> example of <span
class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>the attitude of the proprietary</em></ins></span>
software <span class="removed"><del><strong>pretending to
obey</strong></del></span> <span class="inserted"><ins><em>industry
+ twisted ways that they present snooping as a way to “serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1681,127 +1682,152 @@
<li id="M201506264">
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
- Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p>
+ A study</em></ins></span> in <span
class="inserted"><ins><em>2015</a> found that 90% of</em></ins></span>
the <span class="removed"><del><strong>500 most popular</strong></del></span>
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
+ Android <span
class="removed"><del><strong>apps</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps contained recognizable tracking libraries.
For the paid
+ proprietary apps, it was only 60%.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>should not have
described these</strong></del></span> <span
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
+ <span
class="removed"><del><strong>“free”—they</strong></del></span>
+ <span class="inserted"><ins><em>“free”, but most of
them</em></ins></span> are not <span class="removed"><del><strong>free
software. The clear way to say
+ “zero price” is “gratis.”</p>
- <p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>granted</strong></del></span> that <span
class="removed"><del><strong>the usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
+ is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
<span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android apps <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>location information</a> of
their users with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on the
average.</p></em></ins></span>
+ <p>Gratis</em></ins></span> Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
+ </li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+ <li><p>Some manufacturers add a</strong></del></span>
<span class="inserted"><ins><em><li id="M201504060">
- <p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in
addition</em></ins></span> to
- the <span class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>snooping done by
the phone company, and perhaps by the OS</em></ins></span> in
- the <span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+ <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any
file</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</em></ins></span> on the <span
class="removed"><del><strong>system.</p>
+ </li>
+</ul>
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>phone.</p>
- <p>Don't be distracted by the question of whether the app developers
- get users</em></ins></span> to say
- <span class="removed"><del><strong>“zero
price”</strong></del></span> <span class="inserted"><ins><em>“I
agree”. That</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>no excuse</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span>
- <span class="inserted"><ins><em>malware.</p>
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user</a>. This is in addition</em></ins></span>
to <span class="removed"><del><strong>place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span>
+ <span class="inserted"><ins><em>the phone.</p>
+
+ <p>Don't be distracted by the question of whether the app developers
+ get users</em></ins></span> to <span class="removed"><del><strong>use it
without having your fingerprints
+ taken. Users would have</strong></del></span> <span
class="inserted"><ins><em>say “I agree”. That is</em></ins></span>
no <span class="inserted"><ins><em>excuse for
+ malware.</p>
</li>
<li id="M201411260">
<p>Many proprietary apps for mobile devices
- report which other apps</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
-
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
- is <span class="removed"><del><strong>that valid? Software developers
have no right to
- analyze what users are</strong></del></span> doing <span
class="removed"><del><strong>or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>this in a
way</em></ins></span> that <span class="removed"><del><strong>snoop are
- just</strong></del></span> <span class="inserted"><ins><em>at least is
visible and optional</a>. Not</em></ins></span>
- as <span class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> as <span
class="removed"><del><strong>any</strong></del></span> <span
class="inserted"><ins><em>what the others do.</p>
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a</em></ins></span> way <span
class="removed"><del><strong>to tell whether</strong></del></span> <span
class="inserted"><ins><em>that at least is visible and optional</a>. Not
+ as bad as what</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>others do.</p>
</li>
<li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ <p>The Simeji keyboard</em></ins></span> is <span
class="removed"><del><strong>snooping on
+ them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>a smartphone version of Baidu's</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
<p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
+ use</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> data <span
class="inserted"><ins><em>on the user's computer, but it does surveillance too:
<a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of</em></ins></span> other <span
class="removed"><del><strong>snooping.</p></strong></del></span> <span
class="inserted"><ins><em>people's phone
+ it tries</em></ins></span> to <span class="removed"><del><strong>Apple's
servers</a>. Big Brother can</strong></del></span> get <span
class="removed"><del><strong>them from there.</p></strong></del></span>
<span class="inserted"><ins><em>the user's list of other people's phone
numbers</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
<span class="inserted"><ins><em><li id="M201312060">
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
+ <p>The Brightest Flashlight</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends</em></ins></span> user <span class="removed"><del><strong>types into
it</a>; the server records these numbers</strong></del></span> <span
class="inserted"><ins><em>data, including geolocation,</em></ins></span> for
<span class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>use by companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but
did</em></ins></span> not <span class="removed"><del><strong><a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span class="inserted"><ins><em>ask
- about sending it</em></ins></span> to <span
class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>other
companies. This shows</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>weakness of
- the reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
- <span class="inserted"><ins><em>surveillance: why should a flashlight
app</em></ins></span> send <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>any
information</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
+ approve sending personal data</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>app
developer but did not ask
+ about sending it</em></ins></span> to <span
class="removed"><del><strong>it.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212100">
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows the
weakness</em></ins></span> of
+ the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
</li>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span>
+ <li id="M201212100">
+ <p>FTC says</em></ins></span> most <span
class="removed"><del><strong>popular iOS</strong></del></span> <span
class="inserted"><ins><em>mobile</em></ins></span> apps <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
-
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+ <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908151">
- <p>Skype refuses to say whether it can <a
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> <span
class="inserted"><ins><em>say whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
@@ -1815,170 +1841,180 @@
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the
phone</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202010221">
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>snooping</strong></del></span> <span
class="inserted"><ins><em>imposing its
- surveillance</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span class="inserted"><ins><em>the
game</em></ins></span> of <span class="removed"><del><strong>personal data to
Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
+ <p>Microsoft is imposing its
+ surveillance on</em></ins></span> the <span
class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores</strong></del></span> <span
class="inserted"><ins><em>game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
+ every <span class="removed"><del><strong>photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>player</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>open an account</em></ins></span> on <span
class="inserted"><ins><em>Microsoft's network</a>. Microsoft
+ has bought the game and will merge</em></ins></span> all <span
class="removed"><del><strong>your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <li><p>The iMessage app on iThings</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
- every <span class="removed"><del><strong>phone number
that</strong></del></span> <span class="inserted"><ins><em>player to open an
account on Microsoft's network</a>. Microsoft
- has bought</em></ins></span> the <span class="removed"><del><strong>user
types</strong></del></span> <span class="inserted"><ins><em>game and will merge
all accounts</em></ins></span> into <span
class="removed"><del><strong>it</a>;</strong></del></span> <span
class="inserted"><ins><em>its network,
+ <p>(From</strong></del></span> <span
class="inserted"><ins><em>accounts into its network,
which will give them access to people's data.</p>
- <p>Minecraft players <a
- href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is that it is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
- it offers more options.</p></em></ins></span>
- </li>
+ <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed on 24 Sep 2015.)</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
+ instead.</em></ins></span> The <span class="removed"><del><strong>iCloud
feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</strong></del></span> <span class="inserted"><ins><em>essential
advantage</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>Minetest</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>that</em></ins></span>
it <span class="removed"><del><strong>still counts as</strong></del></span>
<span class="inserted"><ins><em>is free
+ software, meaning it respects the user's computer freedom.
As</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>bonus,
+ it offers more options.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <li id="M201908210">
+ <p>Microsoft recorded users</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Xboxes and had</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+ human workers listen</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p></em></ins></span>
+ <li><p>Spyware in iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+
+ <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p></strong></del></span>
+ <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
<span class="inserted"><ins><em><li id="M201806240">
- <p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span>
+ <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span>
+ is <span class="removed"><del><strong>still true</strong></del></span>
<span class="inserted"><ins><em>found</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
<span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users
with</strong></del></span> <span class="inserted"><ins><em>sends it
to</em></ins></span> third <span
class="removed"><del><strong>parties.</p></strong></del></span> <span
class="inserted"><ins><em>parties</a>.</p></em></ins></span>
+ tracks</em></ins></span> data <span class="removed"><del><strong>from
iPhones for the state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends it to third
parties</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
<span class="inserted"><ins><em><li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> the
<span class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>massive
+ program along with an update to</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on all <span
class="removed"><del><strong>your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to</em></ins></span> snoop on all <span class="removed"><del><strong>the
data in an iThing,
+ or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>open processes running on its user's
computer</a>.</p></em></ins></span>
+ </li>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed</strong></del></span> <span
class="inserted"><ins><em>open processes running</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud feature
is</strong></del></span> <span class="inserted"><ins><em>its user's
computer</a>.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711070">
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong>no
+ possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
+</ul>
- <li id="M201711070">
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>According</strong></del></span>
<span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ information</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201512290">
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to</em></ins></span>
the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span>
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop</em></ins></span> on <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read the contact list. This
malware</strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console</em></ins></span> is a <span
class="removed"><del><strong>way to</strong></del></span> <span
class="inserted"><ins><em>computer, and you can't trust a computer with
- a nonfree operating system.</p>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
+ <span class="inserted"><ins><em>a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active</strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
- collected</em></ins></span> by <span class="removed"><del><strong>default
so it still counts as a
- surveillance functionality.</p>
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <p>Unknown people apparently took advantage of</strong></del></span>
<span class="inserted"><ins><em>various cr…apps and sites made by
different
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span> <span class="inserted"><ins><em>data
+ collected by various cr…apps and sites made by different
companies.</p>
- <p>They use</em></ins></span> this <span
class="inserted"><ins><em>data</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>buy things, and hunt for
- “whales” who</em></ins></span> can <span
class="removed"><del><strong>access any</strong></del></span> <span
class="inserted"><ins><em>be led to spend a lot</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p>
- </li>
-
- <li><p>There is</strong></del></span> <span
class="inserted"><ins><em>money. They</em></ins></span> also
- <span class="inserted"><ins><em>use</em></ins></span> a <span
class="removed"><del><strong>feature for web sites</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> to <span
class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</strong></del></span> <span
class="inserted"><ins><em>manipulate the game play for specific
players.</p>
-
- <p>While the</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6, but it
- is still true in iOS 7.)</p>
- </li>
+ <p>They use this data to manipulate people to buy things, and
hunt</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span>
+ <span class="inserted"><ins><em>“whales” who can be led to
spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span> <span class="inserted"><ins><em>describes gratis
games, games</em></ins></span> that <span class="inserted"><ins><em>cost
money</em></ins></span>
- can <span class="removed"><del><strong>be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>use the same tactics.</p></em></ins></span>
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401280">
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</em></ins></span> for <span class="removed"><del><strong>the
state</a>.</p>
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span> <span class="inserted"><ins><em>cost
money</em></ins></span>
+ can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>companies, and</em></ins></span> the NSA <span
class="removed"><del><strong>snoop on all the data in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>takes advantage
- to spy through</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li id="M201401280">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
+ to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -1986,75 +2022,45 @@
More about NSA app spying</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>.
Here</strong></del></span>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
<span class="inserted"><ins><em><li id="M200510200">
- <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a hidden
- “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+ good deal of personal data</a>, including lots of activities
which</em></ins></span>
+ have <span
class="removed"><del><strong>GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<div <span class="removed"><del><strong>class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
- <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
-</div>
-<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-<span class="inserted"><ins><em><div style="clear: left;"></div>
+<div class="big-section">
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+</div>
+<div style="clear: left;"></div>
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>turn the
phones</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>and off, listen to the microphone, retrieve
geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware is designed to
- disguise itself from investigation.</p>
- </li>
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="inserted"><ins><em>people that</em></ins></span> use <span
class="removed"><del><strong>of data</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that <span
class="removed"><del><strong>their transmission is</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
-
- <p>Don't be</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice</strong></del></span> <span
class="inserted"><ins><em>sucker—reject</em></ins></span> all the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p><small>(It is unfortunate</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that the article uses the term
<a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
-
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2062,73 +2068,68 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you</em></ins></span> on <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>other
way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M202006250">
- <p>TV manufacturers are able to <a
-
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>.
This</em></ins></span> is <span class="inserted"><ins><em>illegal
due</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
- the <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span> of
<span class="removed"><del><strong>data on the user's
computer,</strong></del></span> <span
class="inserted"><ins><em>1988,</em></ins></span> but <span
class="inserted"><ins><em>they're circumventing</em></ins></span>
- it <span class="removed"><del><strong>does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>through
EULAs.</p>
+ <p>TV manufacturers are able to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal
due</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span>
+ the <span class="removed"><del><strong>user's list</strong></del></span>
<span class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span>
of <span class="removed"><del><strong>other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>1988, but they're circumventing
+ it through EULAs.</p></em></ins></span>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>user's list</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own
words</em></ins></span> of <span class="removed"><del><strong>other people's
phone
- numbers.</a></p>
- </li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>the company's
- CTO, and this data is sold to third parties. This is</em></ins></span> in
<span class="removed"><del><strong>Mobile Applications</h4>
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>Mobile Applications</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
<ul>
<li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging by
+ <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>the own words</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable,
according</em></ins></span> to <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>him,
- is that it is opt-in</em></ins></span> in <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ how much access it demands to personal</strong></del></span>
<span class="inserted"><ins><em>the company's
+ CTO, and this</em></ins></span> data <span class="inserted"><ins><em>is
sold to third parties. This is</em></ins></span> in <span
class="removed"><del><strong>the device</a>.
</p>
</li>
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some of its phones. The app</strong></del></span> <span
class="inserted"><ins><em>all future updates</em></ins></span> will <span
class="removed"><del><strong>give Verizon</strong></del></span> <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>same
- information about the users' searches</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
+ announced an opt-in proprietary search app</strong></del></span> <span
class="inserted"><ins><em>return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
- <p>If you already own a Vizio smart TV (or any smart TV,
for</em></ins></span> that <span class="removed"><del><strong>Google normally
gets when
+ <p>What is supposed to make this spying acceptable, according to him,
+ is</em></ins></span> that it <span
class="removed"><del><strong>will</a>
+ pre-install on some of its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>is opt-in in
newer models. But since</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>users' searches</strong></del></span>
<span class="inserted"><ins><em>scenes,
+ and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
they use its search engine.</p>
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't
spying</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>, and</strong></del></span> <span class="inserted"><ins><em>you
is
- to disconnect it from</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>Internet, and use
a terrestrial antenna
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>all future updates will leave</em></ins></span> the
<span class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>you is
+ to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
+ be an old computer running completely free software),</em></ins></span>
and <span class="inserted"><ins><em>set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
@@ -2138,14 +2139,15 @@
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article for</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It</em></ins></span>
- is
- <span class="removed"><del><strong>still spyware.</p>
+ <p>We link to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>article
for</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>facts it
presents. It
+ is too bad that</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
+ moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
+ still spyware.</p>
</li>
- <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p></li>
<li><p>A pregnancy test controller application not only
@@ -2201,13 +2203,12 @@
scans</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who
- is in the frame.</p>
-
- <p>This spyware feature seems</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
<span class="inserted"><ins><em>across devices.</p>
- <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
is an injustice already.</p>
</li>
@@ -2259,29 +2260,28 @@
is doing this in a way that at least is visible</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>they wanted to
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
record</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
<span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on <span class="inserted"><ins><em>what
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
+ used <span class="inserted"><ins><em>a firmware “upgrade” to
make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
+ <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
<span class="removed"><del><strong>the snooping done by the
phone</strong></del></span> <span
class="inserted"><ins><em>another</em></ins></span> company, <span
class="inserted"><ins><em>Nuance</a>.
Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>phone.</p>
@@ -2289,55 +2289,53 @@
<p>Don't</strong></del></span> <span class="inserted"><ins><em>US
or some
other government.</p>
- <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span
class="inserted"><ins><em>free
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span
class="removed"><del><strong>the question of whether the app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>third
parties</a>.</p>
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
+ <p>The Amazon “Smart” TV</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p></em></ins></span>
</li>
- <li id="M201409290">
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>whether the app developers</strong></del></span>
<span class="inserted"><ins><em>2014, but we don't expect this has got
+ <span class="inserted"><ins><em><li id="M201409290">
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014, but we don't expect</em></ins></span> this <span
class="removed"><del><strong>app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>has got
better.</p>
- <p>This shows that laws requiring products to</em></ins></span> get
- <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>users' formal
- consent before collecting personal data are totally inadequate.
+ <p>This shows that laws requiring products</em></ins></span> to
+ <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>get users' formal
+ consent before collecting</em></ins></span> personal data <span
class="inserted"><ins><em>are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking, the TV will not
- work.”</p>
-
- <p>Proper laws would</em></ins></span> say <span
class="removed"><del><strong>“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>that
TVs are not allowed to report what the
- user watches—no exceptions!</p></em></ins></span>
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>TV will</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending
it</strong></del></span>
+ <span class="inserted"><ins><em>work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the</em></ins></span> user <span
class="removed"><del><strong>data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>watches, and the switch to turn</em></ins></span>
this <span class="removed"><del><strong>app because it
asked</strong></del></span> <span class="inserted"><ins><em>off has
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal</strong></del></span> <span
class="inserted"><ins><em>server could save that</em></ins></span> data <span
class="removed"><del><strong>to the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+ really means nothing; the server could save that data anyway.)</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the
<span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
@@ -2428,15 +2426,17 @@
<div class="big-subsection">
<h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+<span class="removed"><del><strong></div>
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
+<ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
@@ -2476,32 +2476,28 @@
<p>The company's statement that it was anonymizing the data may be
true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
+ broker, the data broker would have <span class="removed"><del><strong>been
able to figure out
+ who the user was.</p>
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers</em></ins></span> found a way to access the data</a>
collected by the
- manufacturer's snooping.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
+ collected by the manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareAtLowLevel -->
@@ -2522,21 +2518,16 @@
<ul>
<li><p>
<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
Note that the specific sabotage method Lenovo used did not affect
GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2550,339 +2541,425 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>been able to figure out who</em></ins></span> the
<span class="removed"><del><strong>emails of members of
Parliament</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
- toys themselves.</p>
- </li>
+ <p>Following</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
- <li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Skype:
+<ul>
+ <li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. Guess
what?</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
+ manufacturer's snooping.</p>
+ <p>That</em></ins></span> the manufacturer <span
class="removed"><del><strong>is using it</strong></del></span> <span
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and</em></ins></span> even
<span class="removed"><del><strong>which page</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>spy on
children and adults</a>.</p></em></ins></span>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li>
- <p>The</strong></del></span>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202009270">
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
+ </li>
+<span class="inserted"><ins><em></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+
+<ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M202009270">
<p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
+ software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ surveil</em></ins></span> and <span class="removed"><del><strong>make
changes</strong></del></span> <span class="inserted"><ins><em>monitor staff
working at home</a>. If the program reports
+ whether you are “active,” that is</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>effect a malicious
surveillance feature.</p>
</li>
<li id="M202008030">
- <p>Google</em></ins></span> Nest <span
class="removed"><del><strong>Cam “smart”
camera</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
- update to its speaker devices using their back door</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>its speaker
devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This</em></ins></span> means the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
- than just their wake words. Google says the software update was sent
+ that an alarm is happening. This means</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
+ than just their wake words. Google says</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>software update was sent
out prematurely and on accident and Google was planning on disclosing
- this new feature and offering</em></ins></span> it to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>customers who pay for it.</p></em></ins></span>
+ this new feature and offering</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>to customers who pay</em></ins></span> for
+ <span class="removed"><del><strong>authentication, you couldn't be
confident</strong></del></span> <span class="inserted"><ins><em>it.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202006300">
- <p>“Bossware” is malware that bosses <a
+ <li id="M202006300">
+ <p>“Bossware” is malware</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
+ coerce workers into installing</em></ins></span> in <span
class="inserted"><ins><em>their own computers</a>, so</em></ins></span>
the <span class="removed"><del><strong>car</strong></del></span>
+ <span class="inserted"><ins><em>bosses can spy on them.</p>
-<ul>
- <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>their own computers</a>, so the
- bosses</em></ins></span> can <span class="removed"><del><strong>contain
Javascript code,</strong></del></span> <span class="inserted"><ins><em>spy on
them.</p>
-
- <p>This shows why requiring the user's “consent” is not
+ <p>This shows why requiring the user's
“consent”</em></ins></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>not
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal</em></ins></span> and <span class="inserted"><ins><em>bosses
that demand it should be prosecuted for it.</p>
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
</li>
<li id="M201911190">
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>household
+ a security vulnerability that enabled attackers</em></ins></span> to <span
class="inserted"><ins><em><a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
+ modem enables the phone company to track</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and snoop
on</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>household
through connected surveillance devices.</p>
- <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>wifi
password would not be sufficient to carry
- out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
+ <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>wifi password would not be
sufficient</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span class="inserted"><ins><em>carry
+ out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also</em></ins></span> used by
<span class="removed"><del><strong>most US libraries,</strong></del></span>
<span class="inserted"><ins><em>their
- manufacturers for snooping.</p>
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p></em></ins></span>
</li>
- <li id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201907210">
+ <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when
one</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>Google's
- subcontractors discloses a thousand confidential voice recordings,
+ when it</em></ins></span> is <span class="removed"><del><strong>made
available</strong></del></span> <span class="inserted"><ins><em>not
supposed</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>listen</a>. Thus, when one</em></ins></span> of
<span class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
+ really</strong></del></span> <span class="inserted"><ins><em>Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done by</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
users were easily identified from these recordings.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>see or
control what it records or sends.</p>
+ <p>Since Google “Assistant” uses</em></ins></span>
proprietary <span class="removed"><del><strong>malware in the
car.</p></li>
- <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>software, there is no
+ way</em></ins></span> to <span class="removed"><del><strong>extract data
remotely and
+ determine the car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em>see or control
what</em></ins></span> it <span class="removed"><del><strong>doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
</li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
+<div style="clear: left;"></div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google
service.</p></em></ins></span>
+ <li><p>Nest thermometers</strong></del></span> send <span
class="removed"><del><strong><a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> to <span
class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
+ recordings made without</em></ins></span> a <span
class="removed"><del><strong>woman came up to me</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse,</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers,
which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the <span class="removed"><del><strong>system has no authentication
when</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be</em></ins></span> accessed <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>by
- advertising companies and government agencies. In other words,
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain</em></ins></span> on <span
class="removed"><del><strong>them,</strong></del></span> <span
class="inserted"><ins><em>other servers</a>, where they can be accessed by
+ advertising companies</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the
servers</em></ins></span>
- the <span class="removed"><del><strong>modem. However, even if it asked
for
- authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are
tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
- at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
- </li>
-
- <li id="M201904240">
- <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
+ Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong>cable</a>. Even
if</strong></del></span> the <span class="removed"><del><strong>image is coming
from</strong></del></span> <span class="inserted"><ins><em>Sonos
+ speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
+ the <span class="removed"><del><strong>TV reports what it is. The
existence of a way</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they are made
available</em></ins></span> to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
+ at home,</em></ins></span> not <span class="removed"><del><strong>hidden
as it was</strong></del></span> <span
class="inserted"><ins><em>only</em></ins></span> in
+ <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>present, but in the past (and, who knows,
+ in the future too?)</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904240">
+ <p>Some of users' commands to the Alexa service
are</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
+ <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>the Alexa service
staff even</em></ins></span> has <span class="removed"><del><strong>got
better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
+ location and other</em></ins></span> personal <span
class="inserted"><ins><em>data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since the client program is nonfree, and</em></ins></span> data
<span class="removed"><del><strong>are totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>processing is
done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+ to know</em></ins></span> what happens <span
class="removed"><del><strong>if a user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
+ break their non-disclosure agreements</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
- paying for the subscription,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
+ paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
paid for.</p>
- <p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really</strong></del></span>
- <span class="inserted"><ins><em>working order.</p>
+ <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
+ specific cases, it spies</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
+ restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but having it enabled by
default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
+ working order.</p></em></ins></span>
</li>
- <li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
- <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>product</em></ins></span> in <span
class="inserted"><ins><em>that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
+ <span class="inserted"><ins><em><li id="M201808120">
+ <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>600 millions social media profiles the company
already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+ and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The</strong></del></span>
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would</em></ins></span> be
+ <span class="removed"><del><strong>picked up by proprietary malware
running on other devices in
+ range so</strong></del></span> <span class="inserted"><ins><em>much
+ easier for Amazon. And if some government such</em></ins></span> as <span
class="inserted"><ins><em>China or the US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell the product
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.
Once your
+ Internet devices</strong></del></span> <span
class="inserted"><ins><em>country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p><small>(These crackers</em></ins></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>probably
hackers too, but please</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking” to mean “breaking
security”</a>.)</small></p>
- </li>
-
- <li id="M201804140">
- <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ “hacking” to mean “breaking
security”</a>.)</small></p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <li id="M201706204">
- <p>Lots of “smart” products are designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
-
- <p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span
class="removed"><del><strong>store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially
spying</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped, it could be saving up
records
- about you for later examination.</p>
- </li>
-
- <li id="M201407170">
- <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>gratis
electronic toothbrush that snoops on its user by
+ sending usage data back over the
Internet</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706204">
+ <p>Lots of “smart” products are
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in the house,</em></ins></span> all the
time</a>.</p>
+
+ <span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260">
+ <li id="M201310260">
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2894,54 +2971,34 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
- computer, the TV reports what it is. The existence of a way to
- disable</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>child.</p>
+ privacy. In addition, they</em></ins></span> have <span
class="inserted"><ins><em>a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people)</em></ins></span> to
+ <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>word “<a
+ <p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p></em></ins></span>
+ to mean “crackers.”)</small></p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
-
- <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
+ <li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>back door, but</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="inserted"><ins><em>is certainly surveillance, at least.</p>
</li>
<li id="M201407090">
<p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to report <span class="removed"><del><strong>what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>its location to someone else and to transmit
conversations
- too</a>.</p></em></ins></span>
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
+ too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2951,223 +3008,197 @@
<ul class="blurbs">
<li id="M202008181">
- <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that
advertisers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data to AWS to help create custom insurance premiums</a>
+ <p>New Toyotas will <a
+ href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ upload data</em></ins></span> to <span class="removed"><del><strong>the US
or some other government.</p>
+ <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>AWS</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
+ by</strong></del></span> <span class="inserted"><ins><em>help create
custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span
class="removed"><del><strong>track</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If</em></ins></span> you
- <span class="removed"><del><strong>across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>want
- GPS navigation, get a separate navigator which runs free software
- and works with Open Street Map.</p>
+ <p>Before you buy a “connected” car, make sure you can
+ disconnect its cellular antenna and its GPS antenna. If you want
+ GPS navigation, get a separate navigator which runs</em></ins></span> free
software <span class="removed"><del><strong>in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that</strong></del></span>
+ <span class="inserted"><ins><em>and works with Open Street Map.</p>
</li>
<li id="M201912171">
- <p>Most modern cars now <a
-
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. For
- the user, access to the data is nearly impossible, as</em></ins></span> it
<span class="removed"><del><strong>enabled by default</strong></del></span>
<span class="inserted"><ins><em>involves
- cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information will be
transmitted</strong></del></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
</li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
the <span class="removed"><del><strong>user watches, and</strong></del></span>
<span class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>user, access</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact that the
+ transmission reports a 404 error really means
nothing;</strong></del></span> the <span class="removed"><del><strong>server
+ could save that</strong></del></span> data <span
class="removed"><del><strong>anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>is nearly impossible, as</em></ins></span> it
+ <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>involves
+ cracking</em></ins></span> the <span class="removed"><del><strong>user's
local network.</a></p>
+
+ <p>LG later said it had installed a patch to stop this, but any
product
+ could spy this way.</p>
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do</strong></del></span> <span class="inserted"><ins><em>car's computer, which
is always hidden and running with
+ proprietary software.</p>
</li>
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and <a
+ <p>Tesla cars collect</em></ins></span> lots of <span
class="removed"><del><strong>spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>personal data,</em></ins></span> and <span
class="removed"><del><strong>even what</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>them</a>.</p>
+ when</em></ins></span> they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>a junkyard the driver's personal data goes with
+ them</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+<li><p>Users are suing Bose for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford</em></ins></span> a
<span class="removed"><del><strong>spyware app for its headphones</a>.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>lot of
data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in breaking the
- connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
- antenna</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
+ <p>If you own one of these cars, have you succeeded in
breaking</em></ins></span> the <span class="removed"><del><strong>app would
record</strong></del></span>
+ <span class="inserted"><ins><em>connectivity by
disconnecting</em></ins></span> the <span class="removed"><del><strong>names
of</strong></del></span> <span class="inserted"><ins><em>cellular modem, or
wrapping</em></ins></span> the <span class="removed"><del><strong>audio files
+users listen</strong></del></span>
+ <span class="inserted"><ins><em>antenna in aluminum foil?</p>
</li>
<li id="M201811300">
<p>In China, it is mandatory for electric
- cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ cars</em></ins></span> to <span
class="removed"><del><strong>along</strong></del></span> <span
class="inserted"><ins><em>be equipped</em></ins></span> with <span
class="removed"><del><strong>the headphone's unique serial number.
+</p>
+
+<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>a terminal</em></ins></span> that <span
class="inserted"><ins><em><a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>was done without</strong></del></span> <span
class="inserted"><ins><em>data</a> as part of their own spying, then
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>government-run
platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
+ <li id="M201810230">
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ tracked</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span
class="inserted"><ins><em>choices</em></ins></span> of <span
class="inserted"><ins><em>radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into</em></ins></span> the <span
class="removed"><del><strong>app said</strong></del></span> <span
class="inserted"><ins><em>contract</em></ins></span> that users <span
class="removed"><del><strong>gave consent</strong></del></span> <span
class="inserted"><ins><em>sign</em></ins></span> for <span
class="removed"><del><strong>this,
+would</strong></del></span> <span class="inserted"><ins><em>some digital
service
+ or other. A requirement for consent is effectively no protection.</p>
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of</em></ins></span> that <span
class="inserted"><ins><em>data.</p>
</li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
- hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports a 404 error really means nothing; the server
- could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
- could spy this way.</p>
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<p>AI-powered driving apps can <a
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></em></ins></span>
+ track your every move</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<ul>
-<li><p>Users</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree
software</em></ins></span> are <span class="removed"><del><strong>suing Bose
for</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
+ <p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
+ access its computers remotely and</em></ins></span> make <span
class="inserted"><ins><em>changes in various
settings</a>.</p>
- <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if</em></ins></span> it
<span class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
+ for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
- it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p>
- </li>
-
- <li id="M201306140">
- <p>Tesla cars allow the company</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>extract
- data remotely and determine the car's location</em></ins></span>
- at <span class="removed"><del><strong>all</a>.
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
</p>
</li>
<li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>any time. (See Section 2, paragraphs
b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
-
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't store this
- information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
+ video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the
cell phone modem
+ enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201303250">
- <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
- available to car manufacturers, insurance companies, and others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>wide
range</strong></del></span> <span
class="inserted"><ins><em>matter</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>proprietary surveillance. These systems
- are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
- collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
- other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
+ it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow the company to extract</em></ins></span>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p>
+ </li>
+
+ <li id="M201303250">
+ <p id="records-drivers">Proprietary software in cars <a
+
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
companies.</p>
- <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>proprietary malware in the car.</p>
+ <p>They use this data to manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
+
+ <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>back
door</strong></del></span> <span class="inserted"><ins><em>matter of
proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
+ anonymous payment systems, but the invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in the car.</p>
</li>
</ul>
@@ -3181,10 +3212,8 @@
<li id="M202008182">
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
- for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
- also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
- free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
+ users to identify themselves</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ free rein to pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
@@ -3213,14 +3242,17 @@
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on <span
class="removed"><del><strong>their visitors. Web sites are not
- programs, so it</strong></del></span> <span class="inserted"><ins><em>their
visitors. Web sites are not
+<p>In addition, many web sites spy on their visitors. Web sites are not
programs, so it
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
but the surveillance is an abuse all the same.</p>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li><p>When</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904210">
<p>As of April 2019, it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
@@ -3233,22 +3265,16 @@
</li>
<li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical
tag</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense to call them “free” or
“proprietary”</a>,
- but</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent</em></ins></span> the <span class="removed"><del><strong>surveillance
is an abuse all</strong></del></span> <span class="inserted"><ins><em>precise
GPS location to Twitter's server</a>. It still
+ <p>Until 2015, any tweet that listed a geographical tag <a
+
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
contains these GPS locations.</p>
</li>
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on</em></ins></span> the <span class="removed"><del><strong>same.</p>
-
-<ul>
-
- <li><p>When</strong></del></span> <span
class="inserted"><ins><em>reporters that use it</a>.</p>
+ on the reporters that use it</a>.</p>
</li>
<li id="M201701060">
@@ -3266,63 +3292,54 @@
<p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>. Most of
- the tracking is done by recording interactions with servers, but
- proprietary software contributes.</p>
+ the <span class="removed"><del><strong>tracking is done by recording
interactions with
+ servers, but proprietary software contributes.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
+ <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p></strong></del></span> <span
class="inserted"><ins><em>tracking is done by recording interactions with
servers, but
+ proprietary software contributes.</p>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405140">
+ <li id="M201405140">
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
- data</a>.</p></em></ins></span>
+ Microsoft SkyDrive allows the NSA to directly examine users'
+ data</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210240">
- <p>Many</em></ins></span> web sites rat their visitors to advertising
+ <li id="M201210240">
+ <p>Many web sites rat their visitors to advertising
networks that track users. Of the top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
(as of 5/17/2012) fed their visitors third-party cookies, allowing
other sites to track them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201208210">
- <p>Many</em></ins></span> web sites report all their visitors
+ <li id="M201208210">
+ <p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p></em></ins></span>
+ tells Google the IP address and the page that was
visited</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201200000">
- <p>Many</em></ins></span> web sites try to collect users' address
books (the user's list
+ <li id="M201200000">
+ <p>Many web sites try to collect users' address books (the user's
list
of other people's phone numbers or email addresses). This violates
- the privacy of those other people.</p>
+ the privacy of those other people.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Pages</strong></del></span>
<span class="inserted"><ins><em><li id="M201110040">
- <p>Pages that contain “Like” buttons <a
-
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ <p>Pages</em></ins></span> that contain “Like” buttons
<a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></em></ins></span>
enable Facebook to track visitors to those pages</a>—even users
that don't have Facebook accounts.</p>
</li>
-</ul>
+
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -3332,15 +3349,16 @@
<ul class="blurbs">
<li id="M201811270">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
+ <p>Many</em></ins></span> web sites <span
class="removed"><del><strong>rat their visitors</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
+ to <span class="removed"><del><strong>advertising
networks</strong></del></span> <span class="inserted"><ins><em>snoop on
information</em></ins></span> that <span class="removed"><del><strong>track
+ users. Of</strong></del></span> <span class="inserted"><ins><em>users
have typed into a
form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>same sort of
- malware</em></ins></span> to <span class="removed"><del><strong>directly
examine users' data</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The chat facilities of some customer services
use</em></ins></span> the <span class="removed"><del><strong>top
1000</strong></del></span> <span class="inserted"><ins><em>same sort of
+ malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
read what the user is typing before it is posted</a>.</p>
</li>
@@ -3348,13 +3366,15 @@
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
+ JavaScript on its</em></ins></span> web <span
class="removed"><del><strong>sites,</strong></del></span> <span
class="inserted"><ins><em>site to give other companies personal data on
its customers</a>.</p>
</li>
<li id="M201712300">
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ <p>Some JavaScript malware</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
@@ -3385,59 +3405,79 @@
<li id="M201003010">
<p>Flash Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></em></ins></span>
+ cookie feature helps web sites track visitors</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection --></strong></del></span>
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInChrome">Spyware in
Chrome</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <h4 id="SpywareInChrome">Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Google</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201906220">
- <p>Google</em></ins></span> Chrome <span
class="removed"><del><strong>contains a key logger that</strong></del></span>
<span class="inserted"><ins><em>is an</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key
at</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit to advertising and
- data companies, first of all to Google. Moreover, if users
have</em></ins></span> a <span class="removed"><del><strong>time.</p>
- </li>
-
- <li><p>Google</strong></del></span>
- <span class="inserted"><ins><em>Gmail account,</em></ins></span> Chrome
<span class="removed"><del><strong>includes</strong></del></span> <span
class="inserted"><ins><em>automatically logs them in to the browser for
+ <p>Google Chrome is an <a
+
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
+ instrument</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade
+ users' computers and report the</em></ins></span> sites <span
class="inserted"><ins><em>they visit to advertising and
+ data companies, first of all to Google. Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to the browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
<p>The best way to escape surveillance is to switch to <a
- href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>module</strong></del></span> <span
class="inserted"><ins><em>modified version of Firefox
- with several changes to protect users' privacy.</p>
+ href="/software/icecat/">IceCat</a>, a modified version of Firefox
+ with several changes</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
</li>
- <li id="M201704131">
- <p>Low-priced Chromebooks for schools are <a
- href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <span class="removed"><del><strong><li><p>Many web sites report
all their visitors to Google by using
+ the Google Analytics service, which</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704131">
+ <p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain about the lack
- of transparency on the part of both the educational services and the
- schools, the difficulty of opting out of these services, and the lack
- of proper privacy policies, among other things.</p>
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>lack
+ of transparency on the part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
+ </li>
+
+ <li><p>Many web sites try to collect users' address books (the
+ user's list</strong></del></span>
+ <span class="inserted"><ins><em>schools, the difficulty</em></ins></span>
of <span class="removed"><del><strong>other people's phone numbers or email
addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>opting out of these services, and</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
+ of <span class="removed"><del><strong>those</strong></del></span> <span
class="inserted"><ins><em>proper privacy policies, among</em></ins></span>
other <span class="removed"><del><strong>people.</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>things.</p>
<p>But complaining is not sufficient. Parents, students and teachers
- should realize</em></ins></span> that <span class="inserted"><ins><em>the
software Google uses to spy on students is
+ should realize that</em></ins></span> the <span
class="removed"><del><strong>NSA to directly examine users'
data</a>.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software Google uses</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+ <li><p>Google Chrome contains a key logger
that</strong></del></span> <span class="inserted"><ins><em>students is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
- exclusively use free software</a> for both
education</em></ins></span> and <span class="removed"><del><strong>transmits
audio</strong></del></span> <span class="inserted"><ins><em>school
+ to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one
key</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board</em></ins></span> to
<span class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>refuse the
- budget unless the school initiates a switch to free software. If
+ can mandate their representatives</em></ins></span> at <span
class="inserted"><ins><em>the School Board to refuse the
+ budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>time.</p>
+ </li>
+
+ <li><p>Google Chrome includes a module that
+ <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>free software. If
education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
etc.) to migrate the public schools to free
software.</p></em></ins></span>
@@ -3509,20 +3549,13 @@
<span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
proprietary software</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in order to create
an account on</em></ins></span>
- the
- <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company's network. On top of mistreating their
users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p></em></ins></span>
+ people to give their phone number</a> in order</em></ins></span> to
<span class="removed"><del><strong>make sure they can't “fool” the
+ monitoring</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902040">
- <p>Google invites people</em></ins></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will</strong></del></span> be able to <span
class="removed"><del><strong>listen for speech all</strong></del></span> <span
class="inserted"><ins><em>create an account on</em></ins></span>
+ the <span class="removed"><del><strong>time, even when
“off.”</a></p>
</li>
</ul>
@@ -3534,8 +3567,16 @@
<div style="clear: left;"></div>
<ul>
- <li><p>VR equipment, measuring every slight motion, creates the
- potential</strong></del></span> <span class="inserted"><ins><em>internet
use in their
+ <li><p>VR equipment, measuring every slight motion,
creates</strong></del></span> <span class="inserted"><ins><em>company's
network. On top of mistreating their users by providing
+ nonfree software, Microsoft is tracking their lives
outside</em></ins></span> the
+ <span class="removed"><del><strong>potential</strong></del></span> <span
class="inserted"><ins><em>computer and
+ violates their privacy.</p>
+ </li>
+
+ <li id="M201902040">
+ <p>Google invites people to <a
+
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
+ let Google monitor their phone use, and all internet use in their
homes,</em></ins></span> for <span class="inserted"><ins><em>an
extravagant payment of $20</a>.</p>
<p>This is not a malicious functionality of a program with some other
@@ -3631,7 +3672,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:00 $
+$Date: 2020/11/16 16:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.365
retrieving revision 1.366
diff -u -b -r1.365 -r1.366
--- proprietary-surveillance.it.po 14 Nov 2020 09:33:00 -0000 1.365
+++ proprietary-surveillance.it.po 16 Nov 2020 16:04:00 -0000 1.366
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5293,9 +5293,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary-surveillance.ja-diff.html 14 Nov 2020 09:33:00 -0000
1.223
+++ proprietary-surveillance.ja-diff.html 16 Nov 2020 16:04:00 -0000
1.224
@@ -1704,21 +1704,15 @@
and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>take action. This proves</em></ins></span>
that <span class="removed"><del><strong>they are nearby. Once your
Internet devices</strong></del></span> <span
class="inserted"><ins><em>the policies of a development
platform</em></ins></span> are <span class="removed"><del><strong>paired with
your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>ineffective at
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>ineffective at
preventing nonfree software developers from including malware in
- their programs.</p></em></ins></span>
+ their programs.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>surveillance feature for</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in
interacting</em></ins></span> with <span class="removed"><del><strong>Web
activity, and</strong></del></span> <span class="inserted"><ins><em>the
app.</p>
</li>
<li id="M201902041.1">
@@ -2965,8 +2959,8 @@
sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to
you,</em></ins></span>
- watching <span class="inserted"><ins><em>you, following your movements,
tracking passengers' cell
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
@@ -3131,25 +3125,29 @@
<p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>page that was
visited</a>.</p></em></ins></span>
+ tells Google the IP address and the page that was
visited</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
- <span class="inserted"><ins><em><li id="M201200000">
- <p>Many web sites try to collect</em></ins></span> users' <span
class="removed"><del><strong>voice on</strong></del></span> <span
class="inserted"><ins><em>address books (the user's list
- of other people's phone numbers or email addresses). This
violates</em></ins></span>
- the <span class="removed"><del><strong>internet</strong></del></span>
<span class="inserted"><ins><em>privacy of those other people.</p>
- </li>
-
- <li id="M201110040">
- <p>Pages that contain “Like” buttons <a
-
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it and would
then</strong></del></span> <span class="inserted"><ins><em>track visitors to
those pages</a>—even users
- that don't</em></ins></span> have <span class="inserted"><ins><em>Facebook
accounts.</p>
+ <li id="M201200000">
+ <p>Many web sites try to collect users' address books (the user's
list
+ of other people's phone numbers or email addresses). This violates
+ the privacy of those</em></ins></span> other <span
class="removed"><del><strong><a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
</li>
-</ul>
+ <li><p>Vizio “smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if it isn't a TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>people.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201110040">
+ <p>Pages that contain “Like” buttons</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all the
time</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors to those pages</a>—even users
+ that don't have Facebook accounts.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -3159,11 +3157,12 @@
<ul class="blurbs">
<li id="M201811270">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
- to
- <span class="removed"><del><strong>give it</strong></del></span> <span
class="inserted"><ins><em>snoop on information that users have typed into a
- form but not sent</a>, in order</em></ins></span> to <span
class="removed"><del><strong>the US or</strong></del></span> <span
class="inserted"><ins><em>learn their identity. Some are <a
+ <p>Many web sites use JavaScript code</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
+ to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it and would
then</strong></del></span> <span class="inserted"><ins><em>snoop on information
that users</em></ins></span> have <span class="inserted"><ins><em>typed into a
+ form but not sent</a>, in order</em></ins></span> to
+ <span class="removed"><del><strong>give it to the US
or</strong></del></span> <span class="inserted"><ins><em>learn their identity.
Some are <a
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
getting sued</a> for this.</p>
@@ -3212,7 +3211,7 @@
code.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -3223,7 +3222,7 @@
<ul class="blurbs">
<li id="M201310110">
- <p>Flash and JavaScript are used for <a
+ <p>Flash</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> <span
class="inserted"><ins><em>JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>identify users.</p>
</li>
@@ -3289,27 +3288,26 @@
<!-- #SpywareOnTheWeb -->
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704131">
- <p>Low-priced Chromebooks for schools are <a
- href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
- collecting far more data</em></ins></span> on <span
class="inserted"><ins><em>students than is necessary, and store
- it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>Web</h3>
+ <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy</strong></del></span> <span
class="inserted"><ins><em>lack
- of transparency</em></ins></span> on <span
class="removed"><del><strong>their visitors. Web sites are not
- programs, so it
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+<p>In addition, many web sites spy on their visitors. Web
sites</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704131">
+ <p>Low-priced Chromebooks for schools</em></ins></span> are <span
class="removed"><del><strong>not
+ programs, so it</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
- but</strong></del></span> the <span
class="removed"><del><strong>surveillance is an abuse all</strong></del></span>
<span class="inserted"><ins><em>part of both</em></ins></span> the <span
class="removed"><del><strong>same.</p>
+ but the surveillance</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than</em></ins></span> is <span
class="removed"><del><strong>an abuse all</strong></del></span> <span
class="inserted"><ins><em>necessary, and store
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>same.</p>
<ul>
- <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>educational services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
+ <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>lack
+ of transparency on the part of both the educational
services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
schools, the difficulty</em></ins></span> of <span
class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>.
Most</strong></del></span> <span class="inserted"><ins><em>opting
out</em></ins></span> of <span class="inserted"><ins><em>these services,
and</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>lack
of proper privacy policies, among other things.</p>
@@ -3434,20 +3432,13 @@
<span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
proprietary software</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>give their phone number</a> in order to create
an account on</em></ins></span>
- the
- <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company's network. On top of mistreating their
users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p></em></ins></span>
+ people to give their phone number</a> in order</em></ins></span> to
<span class="removed"><del><strong>make sure they can't “fool” the
+ monitoring</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902040">
- <p>Google invites people</em></ins></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will</strong></del></span> be able to <span
class="removed"><del><strong>listen for speech all</strong></del></span> <span
class="inserted"><ins><em>create an account on</em></ins></span>
+ the <span class="removed"><del><strong>time, even when
“off.”</a></p>
</li>
</ul>
@@ -3459,8 +3450,16 @@
<div style="clear: left;"></div>
<ul>
- <li><p>VR equipment, measuring every slight motion, creates the
- potential</strong></del></span> <span class="inserted"><ins><em>internet
use in their
+ <li><p>VR equipment, measuring every slight motion,
creates</strong></del></span> <span class="inserted"><ins><em>company's
network. On top of mistreating their users by providing
+ nonfree software, Microsoft is tracking their lives
outside</em></ins></span> the
+ <span class="removed"><del><strong>potential</strong></del></span> <span
class="inserted"><ins><em>computer and
+ violates their privacy.</p>
+ </li>
+
+ <li id="M201902040">
+ <p>Google invites people to <a
+
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
+ let Google monitor their phone use, and all internet use in their
homes,</em></ins></span> for <span class="inserted"><ins><em>an
extravagant payment of $20</a>.</p>
<p>This is not a malicious functionality of a program with some other
@@ -3556,7 +3555,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:00 $
+$Date: 2020/11/16 16:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.347
retrieving revision 1.348
diff -u -b -r1.347 -r1.348
--- proprietary-surveillance.ja.po 14 Nov 2020 09:33:01 -0000 1.347
+++ proprietary-surveillance.ja.po 16 Nov 2020 16:04:01 -0000 1.348
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4208,9 +4208,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary-surveillance.pot 14 Nov 2020 09:33:01 -0000 1.286
+++ proprietary-surveillance.pot 16 Nov 2020 16:04:01 -0000 1.287
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3403,10 +3403,10 @@
msgid ""
"Microsoft <a "
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
-"people to give their phone number</a> in order to create an account on the "
-"company's network. On top of mistreating their users by providing nonfree "
-"software, Microsoft is imposing surveillance on people and violating their "
-"privacy."
+"people to give their phone number</a> in order to be able to create an "
+"account on the company's network. On top of mistreating their users by "
+"providing nonfree software, Microsoft is tracking their lives outside the "
+"computer and violates their privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.644
retrieving revision 1.645
diff -u -b -r1.644 -r1.645
--- proprietary-surveillance.ru.po 14 Nov 2020 09:33:01 -0000 1.644
+++ proprietary-surveillance.ru.po 16 Nov 2020 16:04:01 -0000 1.645
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -5023,9 +5023,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.189
retrieving revision 1.190
diff -u -b -r1.189 -r1.190
--- proprietary.de-diff.html 14 Nov 2020 09:33:01 -0000 1.189
+++ proprietary.de-diff.html 16 Nov 2020 16:04:02 -0000 1.190
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -127,16 +127,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -224,10 +224,10 @@
<li id="M201905281">
<p>Microsoft <a
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M202006120">
@@ -329,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:02 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary.de.po 14 Nov 2020 09:33:01 -0000 1.229
+++ proprietary.de.po 16 Nov 2020 16:04:03 -0000 1.230
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -477,9 +477,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.339
retrieving revision 1.340
diff -u -b -r1.339 -r1.340
--- proprietary.es.po 15 Nov 2020 10:46:30 -0000 1.339
+++ proprietary.es.po 16 Nov 2020 16:04:03 -0000 1.340
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -333,13 +334,29 @@
"las llamadas de emergencia y el acceso a la configuración del aparato."
#. type: Content of: <div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary.fr.po 14 Nov 2020 10:29:13 -0000 1.382
+++ proprietary.fr.po 16 Nov 2020 16:04:03 -0000 1.383
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-11-14 11:25+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -329,13 +330,29 @@
"d'urgence et l'accès aux réglages."
#. type: Content of: <div><ul><li><p>
+# | Microsoft <a
+# |
href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
+# | people to give their phone number</a> in order to {+be able to+} create an
+# | account on the company's network. On top of mistreating their users by
+# | providing nonfree software, Microsoft is [-imposing surveillance on
+# | people-] {+tracking their lives outside the computer+} and [-violating-]
+# | {+violates+} their privacy.
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.201
retrieving revision 1.202
diff -u -b -r1.201 -r1.202
--- proprietary.it-diff.html 14 Nov 2020 09:33:01 -0000 1.201
+++ proprietary.it-diff.html 16 Nov 2020 16:04:03 -0000 1.202
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -223,10 +223,10 @@
<li id="M201905281">
<p>Microsoft <a
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M202006120">
@@ -328,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary.it.po 14 Nov 2020 09:33:01 -0000 1.238
+++ proprietary.it.po 16 Nov 2020 16:04:03 -0000 1.239
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -482,9 +482,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.ja-diff.html 14 Nov 2020 09:33:01 -0000 1.206
+++ proprietary.ja-diff.html 16 Nov 2020 16:04:03 -0000 1.207
@@ -56,14 +56,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -161,9 +161,9 @@
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
@@ -222,10 +222,10 @@
<li id="M201905281">
<p>Microsoft <a
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M202006120">
@@ -327,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- proprietary.ja.po 14 Nov 2020 09:33:01 -0000 1.222
+++ proprietary.ja.po 16 Nov 2020 16:04:03 -0000 1.223
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -340,9 +340,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.nl-diff.html 14 Nov 2020 09:33:01 -0000 1.202
+++ proprietary.nl-diff.html 16 Nov 2020 16:04:03 -0000 1.203
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -127,17 +127,17 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -223,10 +223,10 @@
<li id="M201905281">
<p>Microsoft <a
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M202006120">
@@ -328,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.nl.po 14 Nov 2020 09:33:01 -0000 1.212
+++ proprietary.nl.po 16 Nov 2020 16:04:03 -0000 1.213
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -385,9 +385,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary.pl-diff.html 14 Nov 2020 09:33:01 -0000 1.219
+++ proprietary.pl-diff.html 16 Nov 2020 16:04:03 -0000 1.220
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -157,12 +157,12 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -222,10 +222,10 @@
<li id="M201905281">
<p>Microsoft <a
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M202006120">
@@ -327,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary.pl.po 14 Nov 2020 09:33:01 -0000 1.205
+++ proprietary.pl.po 16 Nov 2020 16:04:03 -0000 1.206
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -566,9 +566,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.pot 14 Nov 2020 09:33:01 -0000 1.202
+++ proprietary.pot 16 Nov 2020 16:04:03 -0000 1.203
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -274,10 +274,10 @@
msgid ""
"Microsoft <a "
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
-"people to give their phone number</a> in order to create an account on the "
-"company's network. On top of mistreating their users by providing nonfree "
-"software, Microsoft is imposing surveillance on people and violating their "
-"privacy."
+"people to give their phone number</a> in order to be able to create an "
+"account on the company's network. On top of mistreating their users by "
+"providing nonfree software, Microsoft is tracking their lives outside the "
+"computer and violates their privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary.pt-br-diff.html 14 Nov 2020 09:33:01 -0000 1.11
+++ proprietary.pt-br-diff.html 16 Nov 2020 16:04:03 -0000 1.12
@@ -206,7 +206,7 @@
coerce workers into installing in</strong></del></span>
<span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
people to give</em></ins></span> their <span
class="removed"><del><strong>own computers</a>, so the
- bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone
number</a> in order to create an account</em></ins></span> on <span
class="removed"><del><strong>them.</p>
+ bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone
number</a> in order to be able to create an account</em></ins></span> on
<span class="removed"><del><strong>them.</p>
<p>This shows why requiring</strong></del></span>
the <span class="removed"><del><strong>user's
“consent”</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
@@ -214,8 +214,8 @@
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal</strong></del></span> <span class="inserted"><ins><em>imposing
surveillance on people</em></ins></span> and <span
class="removed"><del><strong>bosses that demand it should be prosecuted for
it.</p></strong></del></span>
- <span class="inserted"><ins><em>violating their
privacy.</p></em></ins></span>
+ be illegal</strong></del></span> <span class="inserted"><ins><em>tracking
their lives outside the computer</em></ins></span> and <span
class="removed"><del><strong>bosses that demand it should be prosecuted for
it.</p></strong></del></span>
+ <span class="inserted"><ins><em>violates their
privacy.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M201504210">
@@ -341,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:01 $
+$Date: 2020/11/16 16:04:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.337
retrieving revision 1.338
diff -u -b -r1.337 -r1.338
--- proprietary.pt-br.po 14 Nov 2020 09:33:01 -0000 1.337
+++ proprietary.pt-br.po 16 Nov 2020 16:04:03 -0000 1.338
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -330,9 +330,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- proprietary.ru.po 14 Nov 2020 09:33:01 -0000 1.416
+++ proprietary.ru.po 16 Nov 2020 16:04:03 -0000 1.417
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -340,9 +340,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary.tr.po 14 Nov 2020 13:40:21 -0000 1.75
+++ proprietary.tr.po 16 Nov 2020 16:04:03 -0000 1.76
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-11-14 14:39+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.1\n"
@@ -327,13 +328,22 @@
"bir Åey için kullanılamıyor."
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft, Åirketin aÄında bir hesap açmak isteyen <a
href=\"https://answers."
"microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-"
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.zh-cn.po 16 Nov 2020 05:59:34 -0000 1.85
+++ proprietary.zh-cn.po 16 Nov 2020 16:04:04 -0000 1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-11-16 13:31+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-16 15:56+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -306,13 +307,22 @@
"å¦ç´§æ¥å¼å«å访é®è®¾ç½®ã"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.zh-tw-diff.html 14 Nov 2020 09:33:02 -0000 1.182
+++ proprietary.zh-tw-diff.html 16 Nov 2020 16:04:04 -0000 1.183
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,8 +57,9 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -69,9 +70,8 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -127,16 +127,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -224,10 +224,10 @@
<li id="M201905281">
<p>Microsoft <a
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order to create an account
on
+ people to give their phone number</a> in order to be able to create
an account on
the company's network. On top of mistreating their users by providing
- nonfree software, Microsoft is imposing surveillance on people and
- violating their privacy.</p>
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p>
</li>
<li id="M202006120">
@@ -329,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/14 09:33:02 $
+$Date: 2020/11/16 16:04:04 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary.zh-tw.po 14 Nov 2020 09:33:02 -0000 1.192
+++ proprietary.zh-tw.po 16 Nov 2020 16:04:04 -0000 1.193
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-14 09:25+0000\n"
+"POT-Creation-Date: 2020-11-16 15:56+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -455,9 +455,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- pt-br.po 14 Nov 2020 09:33:02 -0000 1.296
+++ pt-br.po 16 Nov 2020 16:04:04 -0000 1.297
@@ -5075,9 +5075,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.505
retrieving revision 1.506
diff -u -b -r1.505 -r1.506
--- ru.po 14 Nov 2020 09:33:02 -0000 1.505
+++ ru.po 16 Nov 2020 16:04:04 -0000 1.506
@@ -6252,9 +6252,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- tr.po 14 Nov 2020 14:00:57 -0000 1.80
+++ tr.po 16 Nov 2020 16:04:05 -0000 1.81
@@ -4519,13 +4519,22 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft, Åirketin aÄında bir hesap açmak isteyen <a
href=\"https://answers."
"microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-"
@@ -9136,6 +9145,22 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft, Åirketin aÄında bir hesap açmak isteyen <a href=\"https://"
+#~ "answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-"
+#~ "account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">insanları telefon "
+#~ "numaralarını vermeye zorluyor</a>. Microsoft, özgür olmayan yazılım "
+#~ "saÄlayarak kullanıcılara kötü davrandıÄı gibi, insanlara gözetim "
+#~ "dayatıyor ve gizliliklerini ihlal ediyor."
+
#, fuzzy
#~| msgid ""
#~| "As of August, 2020, the pages in this directory list around 450 "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- zh-cn.po 16 Nov 2020 05:59:34 -0000 1.76
+++ zh-cn.po 16 Nov 2020 16:04:05 -0000 1.77
@@ -4440,13 +4440,22 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#| "all/why-does-my-new-e-mail-account-need-a-phone-"
+#| "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#| "phone number</a> in order to create an account on the company's network. "
+#| "On top of mistreating their users by providing nonfree software, "
+#| "Microsoft is imposing surveillance on people and violating their privacy."
msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
@@ -8931,6 +8940,20 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
+#~ msgid ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
+#~ "phone number</a> in order to create an account on the company's network. "
+#~ "On top of mistreating their users by providing nonfree software, "
+#~ "Microsoft is imposing surveillance on people and violating their privacy."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
+#~ "all/why-does-my-new-e-mail-account-need-a-phone-"
+#~ "number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">强å¶äººä»¬æä¾çµè¯å·ç
</a> æ¥"
+#~
"å建微软ç½ç»è´¦å·ã微软é¤äºéè¿æä¾éèªç±è½¯ä»¶æ¥ä¼¤å®³ç¨æ·ä¹å¤ï¼å强å
对ç¨æ·ç"
+#~ "çæ§å¹¶ä¾µç¯ä¸ªäººéç§ã"
+
#, fuzzy
#~| msgid ""
#~| "As of August, 2020, the pages in this directory list around 450 "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- zh-tw.po 14 Nov 2020 09:33:02 -0000 1.232
+++ zh-tw.po 16 Nov 2020 16:04:05 -0000 1.233
@@ -4433,9 +4433,10 @@
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
-"phone number</a> in order to create an account on the company's network. On "
-"top of mistreating their users by providing nonfree software, Microsoft is "
-"imposing surveillance on people and violating their privacy."
+"phone number</a> in order to be able to create an account on the company's "
+"network. On top of mistreating their users by providing nonfree software, "
+"Microsoft is tracking their lives outside the computer and violates their "
+"privacy."
msgstr ""
#. type: Content of: <div><div><ul><li><p>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/02
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/14
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/25