[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 19 Nov 2020 05:31:34 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/11/19 05:31:33
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-in-online-conferencing.es.po
malware-in-online-conferencing.fr.po
malware-in-online-conferencing.pot nl.po pl.po
pot proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.411&r2=1.412
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.fr.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.pot?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.232&r2=1.233
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.354&r2=1.355
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.560&r2=1.561
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.366&r2=1.367
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.348&r2=1.349
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.646&r2=1.647
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.338&r2=1.339
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.418&r2=1.419
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.508&r2=1.509
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.233&r2=1.234
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- de.po 16 Nov 2020 16:03:56 -0000 1.233
+++ de.po 19 Nov 2020 10:31:30 -0000 1.234
@@ -6638,6 +6638,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
# | Copyright © [-2016-] {+2020+} Free Software Foundation, Inc.
#, fuzzy
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- es.po 16 Nov 2020 16:03:57 -0000 1.333
+++ es.po 19 Nov 2020 10:31:30 -0000 1.334
@@ -6487,6 +6487,16 @@
"BigBlueButton, y mejor aún si se instalan en un servidor controlado por los "
"propios usuarios."
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
# | Copyright © [-2014-] {+2020+} Free Software Foundation, Inc.
#, fuzzy
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.411
retrieving revision 1.412
diff -u -b -r1.411 -r1.412
--- fr.po 17 Nov 2020 11:18:47 -0000 1.411
+++ fr.po 19 Nov 2020 10:31:30 -0000 1.412
@@ -5667,6 +5667,16 @@
"directory.fsf.org/wiki/Jitsi\">Jitsi</a> ou BigBlueButton, et c'est encore "
"mieux s'ils sont installés sur un serveur contrôlé par ses utilisateurs."
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
msgid "Copyright © 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2020 Free Software Foundation, Inc."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- it.po 16 Nov 2020 16:03:58 -0000 1.233
+++ it.po 19 Nov 2020 10:31:30 -0000 1.234
@@ -6204,6 +6204,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
# | Copyright © [-2015-] {+2020+} Free Software Foundation, Inc.
#, fuzzy
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- ja.po 16 Nov 2020 16:03:58 -0000 1.241
+++ ja.po 19 Nov 2020 10:31:30 -0000 1.242
@@ -4827,6 +4827,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2017 Free Software Foundation, Inc."
Index: malware-in-online-conferencing.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-in-online-conferencing.es.po 11 Nov 2020 10:09:03 -0000
1.4
+++ malware-in-online-conferencing.es.po 19 Nov 2020 10:31:30 -0000
1.5
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-in-online-conferencing.html\n"
-"POT-Creation-Date: 2020-11-10 15:55+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-11 10:34+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -138,6 +139,16 @@
"BigBlueButton, y mejor aún si se instalan en un servidor controlado por los "
"propios usuarios."
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div><div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: malware-in-online-conferencing.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.fr.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-in-online-conferencing.fr.po 11 Nov 2020 13:18:49 -0000
1.2
+++ malware-in-online-conferencing.fr.po 19 Nov 2020 10:31:30 -0000
1.3
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-in-online-conferencing.html\n"
-"POT-Creation-Date: 2020-11-10 15:55+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-11 13:32+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
@@ -131,6 +132,16 @@
"directory.fsf.org/wiki/Jitsi\">Jitsi</a> ou BigBlueButton, et c'est encore "
"mieux s'ils sont installés sur un serveur contrôlé par ses utilisateurs."
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div><div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: malware-in-online-conferencing.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.pot,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-in-online-conferencing.pot 10 Nov 2020 16:02:01 -0000 1.3
+++ malware-in-online-conferencing.pot 19 Nov 2020 10:31:30 -0000 1.4
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-in-online-conferencing.html\n"
-"POT-Creation-Date: 2020-11-10 15:55+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -104,6 +104,16 @@
"users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\">is
"
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div><div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- nl.po 16 Nov 2020 16:03:59 -0000 1.234
+++ nl.po 19 Nov 2020 10:31:30 -0000 1.235
@@ -4476,6 +4476,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
# | Copyright © [-2015, 2016-] {+2020+} Free Software Foundation, Inc.
#, fuzzy
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- pl.po 16 Nov 2020 16:03:59 -0000 1.233
+++ pl.po 19 Nov 2020 10:31:30 -0000 1.234
@@ -4001,6 +4001,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
# | Copyright © [-2013, 2014, 2015-] {+2020+} Free Software Foundation,
# | Inc.
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.232
retrieving revision 1.233
diff -u -b -r1.232 -r1.233
--- pot 16 Nov 2020 16:03:59 -0000 1.232
+++ pot 19 Nov 2020 10:31:30 -0000 1.233
@@ -3755,6 +3755,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
msgid "Copyright © 2020 Free Software Foundation, Inc."
msgstr ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary-surveillance.de-diff.html 16 Nov 2020 16:03:59 -0000
1.140
+++ proprietary-surveillance.de-diff.html 19 Nov 2020 10:31:30 -0000
1.141
@@ -1352,411 +1352,474 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202003010"></em></ins></span>
- <p>The <span
class="removed"><del><strong>moviepass</strong></del></span> <span
class="inserted"><ins><em>Alipay Health Code</em></ins></span> app
- <span class="inserted"><ins><em>estimates whether the user has
Covid-19</em></ins></span> and <span class="removed"><del><strong>dis-service
spy on users even more than users
- expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
+ <li id="M202003260"></em></ins></span>
+ <p>The <span class="removed"><del><strong>moviepass app and
dis-service spy on users even more than users
+ expected. It</strong></del></span> <span class="inserted"><ins><em>Apple
iOS version of Zoom</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a> even if the user doesn't
have</em></ins></span>
+ a <span class="removed"><del><strong>movie</a>.
</p>
- <p>Don't be tracked — pay cash!</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells the cops directly</a>.</p></em></ins></span>
+ <p>Don't be tracked — pay cash!</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202001290">
- <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The
Sarahah</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging</em></ins></span> app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
- book to developer's server. Note</strong></del></span> that <span
class="inserted"><ins><em>is a good
- reason to use free software instead.</p>
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
- <p><small>Note:</em></ins></span> this article <span
class="removed"><del><strong>misuses</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>words
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span> <span class="inserted"><ins><em>Facebook
account. According</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note that this article
misuses</strong></del></span> the <span class="removed"><del><strong>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p></em></ins></span>
</li>
- <li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>word “free” in</em></ins></span>
- the <span class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ <span class="removed"><del><strong><li>
+ <p>Facebook's</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202003010">
+ <p>The Alipay Health Code</em></ins></span> app <span
class="removed"><del><strong>listens all</strong></del></span>
+ <span class="inserted"><ins><em>estimates whether</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>user has Covid-19 and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
on what people are listening to or watching</a>. In addition, it may
be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
<li>
- <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>sense</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
+ <p>Faceapp appears to do lots of surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>“gratis.”</small></p></em></ins></span>
+ how much access it demands to personal data
in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>cops directly</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</strong></del></span>
- <span class="inserted"><ins><em><li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on <span class="removed"><del><strong>some of
its phones. The app will give Verizon</strong></del></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand to do this.
For</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span>
- <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ <span class="inserted"><ins><em><li id="M202001290">
+ <p>The Amazon Ring</em></ins></span> app <span
class="removed"><del><strong>that it will</a>
+ pre-install on some of its phones. The</strong></del></span> <span
class="inserted"><ins><em>does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="inserted"><ins><em>Great Nation”</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
- internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>Android version was found to contain a
- back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using
this</em></ins></span>
- app <span class="removed"><del><strong>remains spyware—an
“optional” piece of spyware</strong></del></span> is
- <span class="removed"><del><strong>still spyware.</p>
+ <li id="M201912220">
+ <p>The ToToc messaging</em></ins></span> app <span
class="removed"><del><strong>will give Verizon</strong></del></span> <span
class="inserted"><ins><em>seems to be a <a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>government of</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
+ Any nonfree program could be doing this, and</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they</strong></del></span> <span class="inserted"><ins><em>is a good
+ reason to</em></ins></span> use <span class="removed"><del><strong>its
search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>free software instead.</p>
+
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>word “free” in
+ the sense of “gratis.”</small></p>
</li>
- <li><p>The Meitu photo-editing
- app</strong></del></span> <span class="inserted"><ins><em>mandatory at some
workplaces.</p>
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping</em></ins></span> and <span class="inserted"><ins><em>sabotage
capabilities</a> if they install their own
+ software on</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand to do this.
For</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span>
+ <span class="inserted"><ins><em>employee, this</em></ins></span> is
+ <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>simply
nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p></em></ins></span>
+ </li>
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+ <span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation”</em></ins></span> app <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was
found</em></ins></span> to <span
class="inserted"><ins><em>contain</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
- <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes
a clarification
- saying that the tests were</em></ins></span> only
- <span class="removed"><del><strong>can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>performed</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>the Android version</em></ins></span>
- of <span class="removed"><del><strong>data in</strong></del></span> the
<span class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish</em></ins></span> in the <span
class="inserted"><ins><em>users'</em></ins></span>
+ phone, <span class="inserted"><ins><em>as “superusers.”
Downloading</em></ins></span> and <span class="removed"><del><strong>in server
accounts, it can
alter them too</a>.
</p></li>
- <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
+ <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>using this</em></ins></span>
+ app <span class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>is mandatory at some workplaces.</p>
- <li id="M201909091">
- <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>,</em></ins></span> after
<span class="inserted"><ins><em>tricking them
- into giving</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
+ <p>This example illustrates how
“getting</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>protection against massive
surveillance.</p>
</li>
- <li><p>Google's new voice messaging</strong></del></span> app
<span class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>broad permissions in order to use one of its
- functionalities.</p></em></ins></span>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that include
+ <li><p>Apps</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>Twitter.</p>
+ Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>the tests were only performed</em></ins></span> on
<span class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>the Android version
+ of the app,</em></ins></span> and <span class="removed"><del><strong>TV
programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>that, according to
Apple, “this kind of
+ ‘superuser’ surveillance could not be
conducted</em></ins></span> on <span class="removed"><del><strong>various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
+ <span class="inserted"><ins><em>Apple's operating
system.”</p></em></ins></span>
</li>
- <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>Maya</em></ins></span> <a
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909091">
+ <p>The Facebook</em></ins></span> app <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take
according</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
+ and suggests you to share the picture you take according to
who</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it</em></ins></span> is <span
class="removed"><del><strong>in the frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>turned
off</a>, after tricking them
+ into giving</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers</strong></del></span>
<span class="inserted"><ins><em>use one of its
+ functionalities.</p>
</li>
- <li id="M201909060">
- <p>Keeping track of</em></ins></span> who <span
class="inserted"><ins><em>downloads a proprietary
- program</em></ins></span> is <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>list of all</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> users' <span
class="removed"><del><strong>pictures are private
+ anymore, even if the user didn't “upload”
them</strong></del></span> <span
class="inserted"><ins><em>lives</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909060">
+ <p>Keeping track of who downloads a</em></ins></span> proprietary
<span class="removed"><del><strong>malware (DRM and snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize that it</strong></del></span>
+ <span class="inserted"><ins><em>program</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span> a <span
class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>form of surveillance. There</em></ins></span> is a
<span class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many</strong></del></span>
+ proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>program</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>adjusting a
certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not</em></ins></span> be
- <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>a list of who has
installed
+ <p>With a free program there would not be a list of
who</em></ins></span> has
+ <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
- of <span class="removed"><del><strong>Facebook users' pictures
are</strong></del></span> <span class="inserted"><ins><em>the operating system,
in order to gather as much</em></ins></span> private
- <span class="removed"><del><strong>anymore,</strong></del></span> <span
class="inserted"><ins><em>data as
- they possibly can.</p>
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations,</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>.
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing
features
+ of the operating system, in order to gather</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>much private data</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span>
+ <span class="inserted"><ins><em>they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ having control over</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>software we run.</p></em></ins></span>
</li>
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”</strong></del></span>
<span class="inserted"><ins><em>says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907080">
+ <p>Many Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>can track
+ users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>secretly a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too,</em></ins></span> as <span
class="inserted"><ins><em>you must expect from nonfree
+ <p>It snoops</em></ins></span> on <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
programs.</p>
</li>
<li id="M201905060">
- <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many</strong></del></span> proprietary <span
class="removed"><del><strong>apps for mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>phone
app</a> to be allowed into</em></ins></span>
- the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>event.</p>
+ requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>event.</p>
- <p>This app</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>at least is visible</strong></del></span> <span
class="inserted"><ins><em>can snoop on a lot of
- sensitive data, including user's location</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
+ <p>This app</em></ins></span> is <span
class="removed"><del><strong>in addition to</strong></del></span> <span
class="inserted"><ins><em>a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>snooping done</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>contact list,
and has</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and pregnancy
monitoring</em></ins></span> apps <span class="removed"><del><strong>snoop on
the user</a>. This</strong></del></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>often <a
+ <li id="M201904131">
+ <p>Data collected</em></ins></span> by <span
class="removed"><del><strong>the phone company,</strong></del></span> <span
class="inserted"><ins><em>menstrual</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the
<span class="removed"><del><strong>phone.</p>
<p>Don't</strong></del></span>
<span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
<span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
- users to say “I agree”. That is no excuse for
malware.</p>
+ users</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span class="inserted"><ins><em>equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p></em></ins></span>
</li>
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+
+ <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to
+ <span class="removed"><del><strong>approve</strong></del></span> <span
class="inserted"><ins><em>be responsible for</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span>
+ <span class="inserted"><ins><em>the location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
+ </li>
- <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>women's
rights</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>equal employment
- and freedom</em></ins></span> to <span class="removed"><del><strong>the
app developer but did not
- ask about sending it to other companies. This shows the
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="inserted"><ins><em>on</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
- <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have
access</em></ins></span> to <span class="removed"><del><strong>surveillance:
why should a flashlight
+ app send any information</strong></del></span>
+ <span class="inserted"><ins><em>the network but no direct
access</em></ins></span> to <span class="removed"><del><strong>anyone? A free
software flashlight
+ app would not.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>the data. This results</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of</strong></del></span> <span class="inserted"><ins><em>that does
more or less</em></ins></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
+ <li></strong></del></span> <span class="inserted"><ins><em>massive
+ surveillance on which the user has absolutely no control.</p>
</li>
- <li>
- <p>The “smart” toys My Friend
Cayla</strong></del></span> <span class="inserted"><ins><em>same thing without
- spying on you is available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>i-Que transmit</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>speech recognition company
based</strong></del></span> <span class="inserted"><ins><em>new one is being
developed</a>.</p>
+ <li id="M201903201"></em></ins></span>
+ <p>A <span class="removed"><del><strong>remote-control sex toy
was</strong></del></span> <span class="inserted"><ins><em>study of 24
“health” apps</em></ins></span> found <span
class="removed"><del><strong>to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>that
19</em></ins></span> of <span class="removed"><del><strong>the conversation
between two users</a>.</p>
</li>
- <li id="M201904130">
- <p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software</em></ins></span> in the <span
class="removed"><del><strong>U.S.</p>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span
class="inserted"><ins><em>them</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys with a mobile phone.
This would
+ enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>use it
+ for invasive advertising or discriminating against
people</em></ins></span> in <span
class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em>poor
+ medical condition.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>phone has to be responsible for
sending</em></ins></span>
- the <span class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>location data to Google.</p>
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
- <li id="M201903251">
- <p>Many Android phones come</em></ins></span> with a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This
results</em></ins></span> in <span class="inserted"><ins><em>massive
- surveillance</em></ins></span> on <span class="removed"><del><strong>a
child's speech, and even speak
- into</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>user has absolutely no
control.</p></em></ins></span>
+ <li id="M201902230">
+ <p>Facebook offered</em></ins></span> a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program,
not</em></ins></span> even <span class="removed"><del><strong>speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903201"></em></ins></span>
- <p>A <span class="removed"><del><strong>computerized vibrator
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator
<a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p></strong></del></span>
- <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ <span class="inserted"><ins><em><li id="M201902140"></em></ins></span>
+ <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
body), as well as the vibration frequency.</p>
- <p>Note the totally inadequate proposed response: a labeling
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
+ their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p>
+ </li>
+
+ <li id="M201902060">
+ <p>Many nonfree apps</em></ins></span> have
+ <span class="removed"><del><strong>checked and changed.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>19</em></ins></span> of <span
class="inserted"><ins><em>them <a
-
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive</em></ins></span> personal <span
class="removed"><del><strong>information about how
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>personal information about how
people used it</a>.</p>
- <p>The company's statement that it was anonymizing
the</strong></del></span> data <span class="removed"><del><strong>may be
- true, but</strong></del></span> <span class="inserted"><ins><em>to third
parties</a>, which can use</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
- medical condition.</p>
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>data may be
+ true,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
+ difficult.</p>
- <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="removed"><del><strong>had sold the data</strong></del></span>
<span class="inserted"><ins><em>is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient</em></ins></span> to <span
class="inserted"><ins><em>legitimize snooping.</p>
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet,</em></ins></span> but <span class="removed"><del><strong>it
doesn't</strong></del></span> <span class="inserted"><ins><em>they should also
stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they</em></ins></span> really <span
class="removed"><del><strong>matter. If it had sold</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
- <li id="M201902230">
- <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to Facebook</a>. Lots of companies built apps
that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="inserted"><ins><em>personal</em></ins></span>
- data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>they collected</em></ins></span> would <span
class="removed"><del><strong>have been able to figure out
+ <li id="M201902010">
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used</em></ins></span> to <span
class="inserted"><ins><em>spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover,</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps</em></ins></span> have <span class="removed"><del><strong>been able to
figure out
who the user was.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>lousy privacy policies</a>.</p>
- <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not even the
- developers</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p></em></ins></span>
+ <p><small>(It is unfortunate that these articles talk about
“free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to</em></ins></span> the <span
class="inserted"><ins><em>company's server</a>. The</em></ins></span>
company <span class="removed"><del><strong>has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>is
+ being sued, demanding that it notify the users</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys</strong></del></span> <span
class="inserted"><ins><em>what it will do</em></ins></span>
+ with <span class="removed"><del><strong>microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>data.</p>
+
+ <p>We think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way to access</strong></del></span> <span
class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
+ <p>That</strong></del></span> <span class="inserted"><ins><em>data
is a secondary issue. The principal wrong here is that</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>company gets that data at all.</p>
- <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+ <p><a
+
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong>the FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p>
+ </li>
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and adults</a>.</p>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span class="removed"><del><strong>children
and adults</a>.</p>
</li>
</ul>
<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
-
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the user's actions</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>“Smart” Watches</h3>
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
<span class="anchor-reference-id">
(<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
@@ -1764,56 +1827,58 @@
<ul>
<li>
- <p>An LG “smart” watch is designed</strong></del></span>
<span class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users,</em></ins></span> and
<span class="inserted"><ins><em>redirecting
- them</em></ins></span> to <span class="removed"><del><strong>transmit
- conversations too</a>.</p>
+ <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the
user</em></ins></span> is <span class="removed"><del><strong>designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit
+ conversations too</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p></em></ins></span>
</li>
- <li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
<span class="inserted"><ins><em>phishing sites</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>stole their credentials. Furthermore,
- the user interface of most of them was designed</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
- difficult.</p>
+ <span class="removed"><del><strong><li>
+ <p>A very cheap “smart watch” comes with
an</strong></del></span>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
- <p>The article says this is</strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>back door,
but</strong></del></span> <span class="inserted"><ins><em>potential risk because
- there is no easy way of knowing what they really do.</p>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some</em></ins></span> Android <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
</li>
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found</em></ins></span> that <span
class="inserted"><ins><em><a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive
advertising—that</em></ins></span> could
- <span class="inserted"><ins><em>potentially also</em></ins></span> be
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
- found as well.</p>
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
+ tracking”</a>.</p>
- <p>Moreover,</em></ins></span> a
- <span class="removed"><del><strong>misunderstanding. However,
it</strong></del></span> <span class="inserted"><ins><em>previous investigation
had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>certainly surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
+ <p>The article says this is a back door,</strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
+ tracking,</em></ins></span> but <span class="removed"><del><strong>that
could</strong></del></span> <span class="inserted"><ins><em>most users
will</em></ins></span> be <span class="removed"><del><strong>a
+ misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em>tricked by the misleading control.</p>
</li>
-<span class="removed"><del><strong></ul>
+
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
+ least.</p>
+ </li>
+</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>no way to save
+ a recording. But we can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1823,70 +1888,59 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the company's
server</a>. The company is
- being sued, demanding</em></ins></span> that <span
class="inserted"><ins><em>it notify</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>users
of what it will do
- with the data.</p>
+<li><p></strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
+ </li>
- <p>We think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>side issue. What
the company does
- with the data</em></ins></span> is <span class="removed"><del><strong>not
really
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span class="removed"><del><strong>specific
sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>a secondary issue. The principal wrong here is that
- the company gets that data</em></ins></span> at <span
class="removed"><del><strong>Work</h3>
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
<div style="clear: left;"></div>
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span
class="inserted"><ins><em>all.</p>
-
- <p><a
-
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>emails
of members of Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+ <p>Specifically, it can</strong></del></span> <span
class="inserted"><ins><em>snoop
+ and</em></ins></span> collect <span class="removed"><del><strong>the
emails</strong></del></span> <span class="inserted"><ins><em>information about
its users</a>. 40%</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>snooping, in these proprietary apps whose
+ source code</em></ins></span> they <span class="removed"><del><strong>pass
it through Microsoft.</p></li>
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>send the machine's “advertising ID,” so
that
- Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>cannot look at. The other apps might be
snooping</em></ins></span>
+ in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -1895,77 +1949,46 @@
</div>
<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+ <li><p>Spyware in Skype:</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
+ the user if an app contains
anti-features</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> <span
class="inserted"><ins><em>Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
- tracking”</a>.</p>
-
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
- </li>
-
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
-
- <p>This makes them act as spies for licensing enforcement.</p>
-
- <p>We expect it implements DRM, too—that there is no way to
save
- a recording. But we can't be sure from the article.</p>
+<!-- WEBMASTERS: make sure</strong></del></span>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the
information</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
- <li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
+<ul>
+ <li>
+ <p>Every “home security” camera, if</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info
to</em></ins></span> each <span class="removed"><del><strong>subsection
--></strong></del></span>
- <span class="inserted"><ins><em>other but not to the server's
database.</p>
+ <p>Grindr should not have so much information
about</em></ins></span> its <span class="removed"><del><strong>manufacturer
can</strong></del></span> <span class="inserted"><ins><em>users.
+ It could be designed so that users</em></ins></span> communicate <span
class="inserted"><ins><em>such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
@@ -2747,7 +2770,7 @@
</li>
<li id="M201702280">
- <p>“CloudPets” toys with microphones <a
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>it,</strong></del></span> <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
@@ -2775,11 +2798,10 @@
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareInDrones">Drones</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
@@ -2815,58 +2837,46 @@
update to its speaker devices using their back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This means the devices now listen for more
+ that an alarm</em></ins></span> is <span class="removed"><del><strong>a
surveillance device.</strong></del></span> <span
class="inserted"><ins><em>happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely and</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>accident and Google was planning on disclosing
+ out prematurely and on accident and Google was planning on disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
- <p>“Bossware” is malware that bosses <a
-
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>their own
computers</a>, so the
- bosses</em></ins></span> can <span
class="removed"><del><strong>communicate with it,</strong></del></span> <span
class="inserted"><ins><em>spy on them.</p>
-
- <p>This shows why requiring the user's
“consent”</em></ins></span> is <span class="inserted"><ins><em>not
- an adequate basis for protecting digital privacy. The boss can coerce
+ <p>“Bossware” is malware that bosses</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on them.</p>
+
+ <p>This shows why requiring the user's
“consent”</em></ins></span> is <span
class="inserted"><ins><em>not</em></ins></span>
+ an <span class="removed"><del><strong>example</a>.</p>
+ <p>The article describes wrongdoing</strong></del></span> <span
class="inserted"><ins><em>adequate basis for protecting digital privacy. The
boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
be illegal and bosses that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
- <p>Internet-tethered Amazon Ring had</em></ins></span>
- a <span class="inserted"><ins><em>security vulnerability that enabled
attackers to <a
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
access the user's wifi password</a>, and snoop on the household
- through connected</em></ins></span> surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>devices.</p>
+ through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also used by their
+ software lack this. Of course, they are also used</em></ins></span> by
<span class="inserted"><ins><em>their
manufacturers for snooping.</p>
</li>
<li id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
@@ -3889,7 +3899,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:03:59 $
+$Date: 2020/11/19 10:31:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.354
retrieving revision 1.355
diff -u -b -r1.354 -r1.355
--- proprietary-surveillance.de.po 16 Nov 2020 16:03:59 -0000 1.354
+++ proprietary-surveillance.de.po 19 Nov 2020 10:31:30 -0000 1.355
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -2153,6 +2153,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
"surveillance.html\"> tells the cops directly</a>."
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-surveillance.es.po 17 Nov 2020 10:00:04 -0000 1.102
+++ proprietary-surveillance.es.po 19 Nov 2020 10:31:31 -0000 1.103
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-17 10:49+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -1673,6 +1674,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
"surveillance.html\"> tells the cops directly</a>."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.560
retrieving revision 1.561
diff -u -b -r1.560 -r1.561
--- proprietary-surveillance.fr.po 17 Nov 2020 11:18:48 -0000 1.560
+++ proprietary-surveillance.fr.po 19 Nov 2020 10:31:31 -0000 1.561
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-17 12:18+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1668,6 +1669,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
"surveillance.html\"> tells the cops directly</a>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary-surveillance.it-diff.html 16 Nov 2020 16:04:00 -0000
1.206
+++ proprietary-surveillance.it-diff.html 19 Nov 2020 10:31:31 -0000
1.207
@@ -1040,6 +1040,16 @@
</div>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202003010">
<p>The Alipay Health Code app
estimates whether the user has Covid-19 and <a
@@ -3672,7 +3682,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:00 $
+$Date: 2020/11/19 10:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.366
retrieving revision 1.367
diff -u -b -r1.366 -r1.367
--- proprietary-surveillance.it.po 16 Nov 2020 16:04:00 -0000 1.366
+++ proprietary-surveillance.it.po 19 Nov 2020 10:31:31 -0000 1.367
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -2067,6 +2067,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
"surveillance.html\"> tells the cops directly</a>."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- proprietary-surveillance.ja-diff.html 16 Nov 2020 16:04:00 -0000
1.224
+++ proprietary-surveillance.ja-diff.html 19 Nov 2020 10:31:31 -0000
1.225
@@ -1384,60 +1384,38 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202003010">
- <p>The Alipay Health Code app
- estimates whether the user has Covid-19</em></ins></span> and <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells the cops directly</a>.</p>
- </li>
-
- <li id="M202001290">
- <p>The Amazon Ring app does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+ <li><p>Spyware in many e-readers—not only the
+ Kindle:</strong></del></span>
- <span class="inserted"><ins><em><li id="M201912220">
- <p>The ToToc messaging app seems to be a <a
-
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and that is a good
- reason to use free software instead.</p>
-
- <p><small>Note: this article uses the word
“free”</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span>
- the
- <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>sense of “gratis.”</small></p>
- </li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if</em></ins></span> they
<span class="removed"><del><strong>report even which page</strong></del></span>
<span class="inserted"><ins><em>install their own
- software on</em></ins></span> the <span class="removed"><del><strong>user
reads at what time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p></em></ins></span>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a></em></ins></span> even <span
class="removed"><del><strong>which page</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> the user <span
class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
- <span class="inserted"><ins><em><li id="M201910130">
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> <span
class="inserted"><ins><em>Great Nation” app requires
users</em></ins></span> to <span class="removed"><del><strong>Adobe</a>.
Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>grant it
<a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ <span class="inserted"><ins><em><li id="M202003010">
+ <p>The Alipay Health Code app
+ estimates whether</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>user has Covid-19 and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
@@ -1445,97 +1423,146 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202001290">
+ <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for
Amazon</a>.</p></em></ins></span>
</li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912220">
+ <p>The ToToc messaging app seems to be</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
- internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>Android version was found to contain a
- back-door allowing developers to run any code they wish</em></ins></span>
in the <span class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using this
- app</em></ins></span> is
- <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>mandatory at some workplaces.</p>
+ <p>That's easy to do because</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>government of</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
+ Any nonfree program could</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>doing this, and</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>is a
good
+ reason to use free</em></ins></span> software <span
class="inserted"><ins><em>instead.</p>
+
+ <p><small>Note: this article uses the word
“free”</em></ins></span> in
+ the <span class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span class="inserted"><ins><em>sense
of “gratis.”</small></p>
+ </li>
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ <li id="M201912090">
+ <p>iMonsters and Android phones,
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>tests
were only performed on</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Android version
- of</em></ins></span> the <span class="removed"><del><strong>time; it is
possible</strong></del></span> <span class="inserted"><ins><em>app, and that,
according</em></ins></span> to <span class="removed"><del><strong>physically
remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p></em></ins></span>
+ <p>Even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a></em></ins></span> if <span
class="removed"><del><strong>no one connects to the car remotely, the cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>they
install their own
+ software on</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>device. Many
employers demand</em></ins></span> to <span class="removed"><del><strong>track
the car's movements all</strong></del></span> <span
class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span>
+ <span class="inserted"><ins><em>employee, this</em></ins></span> is <span
class="removed"><del><strong>possible to physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
- <span class="inserted"><ins><em><li id="M201909091">
- <p>The Facebook app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it</em></ins></span> is <span
class="removed"><del><strong>made available</strong></del></span> <span
class="inserted"><ins><em>turned off</a>, after tricking them
- into giving the app broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>use one of its
+ <span class="inserted"><ins><em><li id="M201910130">
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>the phone's microphone, photos, text messages,
contacts,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case of toll-collection systems,
mentioned</strong></del></span>
+ <span class="inserted"><ins><em>internet history</a>, and the
Android version was found to contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
+ phone, as “superusers.” Downloading and
using</em></ins></span> this <span
class="removed"><del><strong>article,</strong></del></span>
+ <span class="inserted"><ins><em>app</em></ins></span> is <span
class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>mandatory at some workplaces.</p>
+
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ Washington Post version</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in <span
class="inserted"><ins><em>a text editor) includes a clarification
+ saying that</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on</em></ins></span> the
<span class="removed"><del><strong>company to extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>Android
version
+ of</em></ins></span> the <span class="removed"><del><strong>car's location
at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em>that, according to
Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
+ <li id="M201909091">
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when</em></ins></span> it <span
class="removed"><del><strong>doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
+ into giving</em></ins></span> the <span class="removed"><del><strong>state
orders it</strong></del></span> <span class="inserted"><ins><em>app broad
permissions in order</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>use one of its
functionalities.</p>
</li>
<li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>Maya <a
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>users' lives to
Facebook</a>.</p>
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
- program</em></ins></span> is <span class="removed"><del><strong>not
- really</strong></del></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>form</em></ins></span> of <span
class="removed"><del><strong>proprietary</strong></del></span> surveillance.
<span class="removed"><del><strong>These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>There is a
+ program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>all the 10,000 or more people
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not</em></ins></span> be <span
class="removed"><del><strong>replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>a list of who has installed
+ <p>With a free program there would not be a list of who has installed
it.</p>
</li>
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features
- of</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>operating system,</em></ins></span> in <span
class="inserted"><ins><em>order to gather as much private data as
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
+ of</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>operating system, in order to gather as much private
data as
they possibly can.</p>
- <p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>software we run.</p>
+ <p>Thus, we can't trust rules against spying. What
we</em></ins></span> can <span class="removed"><del><strong>store
it.</p></strong></del></span> <span class="inserted"><ins><em>trust is
+ having control over the software we run.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201907080">
+ <span class="inserted"><ins><em><li id="M201907080">
<p>Many Android apps can track
- users' movements even when</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user says <a
+ users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span class="removed"><del><strong>extract data
remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>allow
them access to locations</a>.</p>
+ not</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>allow them access</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
@@ -1547,52 +1574,10 @@
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
+ programs.</p></em></ins></span>
</li>
-
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>event.</p>
-
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's</em></ins></span> location <span
class="removed"><del><strong>at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
- </li>
-
- <li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though</em></ins></span> the
- data <span class="inserted"><ins><em>is
“anonymized</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>aggregated,”</em></ins></span> it <span
class="removed"><del><strong>over, the state</strong></del></span> can <span
class="removed"><del><strong>store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>easily be
- traced back</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>the woman who uses the app.</p>
-
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>spy
on</strong></del></span> <span class="inserted"><ins><em>equal employment
- and freedom to make</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p>
- </li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1600,111 +1585,133 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>me and
+<p>Emo Phillips made</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a></em></ins></span> to
<span class="removed"><del><strong>me and
said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>was
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>be allowed into</em></ins></span>
+ the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>event.</p>
+
+ <p>This app is a spyware</em></ins></span> that <span
class="removed"><del><strong>was
before Amazon “smart” TVs.</p>
<ul>
- <li><p>More</strong></del></span> <span
class="inserted"><ins><em>does more</em></ins></span> or less <span
class="removed"><del><strong>all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>the same thing without
- spying</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p>
+ <li><p>More or less all “smart” TVs <a href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>can snoop</em></ins></span> on <span
class="removed"><del><strong>their users</a>.</p>
+
+ <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>a lot</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect
this</strong></del></span>
+ <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and</em></ins></span> has <span
class="removed"><del><strong>got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
+ </li>
- <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span class="removed"><del><strong>get
users' formal
+ consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>employers and insurance companies</a>. Even
though the</em></ins></span>
+ data <span class="removed"><del><strong>are totally inadequate.
+ And what happens</strong></del></span> <span
class="inserted"><ins><em>is “anonymized and aggregated,” it can
easily be
+ traced back to the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even</em></ins></span> if <span
class="inserted"><ins><em>someone offers you</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>do so. A
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>does more or
less</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers
in</strong></del></span> <span class="inserted"><ins><em>same thing
without</em></ins></span>
+ spying on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can
track</strong></del></span> you
+ <span class="removed"><del><strong>across devices.</p>
+
+ <p>It</strong></del></span> is <span
class="removed"><del><strong>possible to turn this off, but having it enabled
by default</strong></del></span> <span class="inserted"><ins><em>available from
<a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p>
+ a new one</em></ins></span> is <span class="removed"><del><strong>an
injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p></em></ins></span>
</li>
- <li id="M201904130">
- <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>Android phones and
iPhones
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>movements of
Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
-
- <p>Nonfree software in the phone</em></ins></span> has <span
class="removed"><del><strong>got better.</p>
+ saves</em></ins></span> the <span class="removed"><del><strong>company
already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>data for years</a>.</p>
- <p>This shows that laws requiring products</strong></del></span> to
<span class="removed"><del><strong>get users' formal
- consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending
- the location</em></ins></span> data <span class="removed"><del><strong>are
totally inadequate.
- And what happens if</strong></del></span> <span
class="inserted"><ins><em>to Google.</p>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>huge number of <a
-
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>data, or pass it on to user-installed
apps</em></ins></span> that <span class="removed"><del><strong>TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>have
access</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span>
- the <span class="removed"><del><strong>user watches
—</strong></del></span> <span class="inserted"><ins><em>network
but</em></ins></span> no <span
class="removed"><del><strong>exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>direct
access to the data. This results</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>massive
- surveillance</em></ins></span> on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>which the user has
absolutely no control.</p>
+ <p>Many Android phones come</em></ins></span> with <span
class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>a huge number of</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call
home</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing all users</strong></del></span>
+ <span class="inserted"><ins><em>the data, or pass it on</em></ins></span>
to
+ <span class="removed"><del><strong>new combined</strong></del></span>
<span class="inserted"><ins><em>user-installed apps that have access to
+ the network but no direct access to the data. This results in
massive</em></ins></span>
+ surveillance <span class="removed"><del><strong>by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>on which the user
has absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
-
- <p>It</strong></del></span> <span class="inserted"><ins><em>poor
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span class="inserted"><ins><em>buried
in
+ <p>Whenever user “consent” is sought, it is buried in
lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
+ <li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>malware running</strong></del></span>
+ <span class="inserted"><ins><em>library for building mobile apps, which
also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>personal
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing</strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
<li id="M201902140">
- <p>The AppCensus database gives</em></ins></span> information <span
class="removed"><del><strong>with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ <p>The AppCensus database gives information</em></ins></span> on
<span class="inserted"><ins><em><a
+ href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em><a
+ Advertising ID</a> to</em></ins></span> other <span
class="removed"><del><strong>devices in
+ range</strong></del></span> <span class="inserted"><ins><em>companies,
and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>hardware
identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ 18,000 (23% of the total) link this ID to hardware
identifiers</a>,</em></ins></span>
+ so <span class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>that users cannot escape tracking by resetting
it.</p>
- <p>Collecting hardware identifiers is</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>apparent violation of
+ <p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>take action. This proves</em></ins></span>
that <span class="removed"><del><strong>they are nearby. Once your
Internet devices</strong></del></span> <span
class="inserted"><ins><em>the policies of a development
platform</em></ins></span> are <span class="removed"><del><strong>paired with
your TV, advertisers can
- correlate ads</strong></del></span> <span
class="inserted"><ins><em>ineffective at
+ correlate</strong></del></span> <span
class="inserted"><ins><em>ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
@@ -1712,7 +1719,7 @@
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in
interacting</em></ins></span> with <span class="removed"><del><strong>Web
activity, and</strong></del></span> <span class="inserted"><ins><em>the
app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
@@ -1720,7 +1727,7 @@
be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
+ pushing unwanted and often malicious</em></ins></span> ads <span
class="inserted"><ins><em>on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
@@ -1754,8 +1761,8 @@
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
+ being sued, demanding that it notify the users of what it will
do</em></ins></span>
+ with <span class="removed"><del><strong>Web
activity,</strong></del></span> <span class="inserted"><ins><em>the
data.</p>
<p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
@@ -1763,7 +1770,7 @@
<p><a
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="inserted"><ins><em>WeatherBug, are
tracking people's locations.</p>
</li>
@@ -3555,7 +3562,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:00 $
+$Date: 2020/11/19 10:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.348
retrieving revision 1.349
diff -u -b -r1.348 -r1.349
--- proprietary-surveillance.ja.po 16 Nov 2020 16:04:01 -0000 1.348
+++ proprietary-surveillance.ja.po 19 Nov 2020 10:31:31 -0000 1.349
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -1574,6 +1574,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
"surveillance.html\"> tells the cops directly</a>."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary-surveillance.pot 16 Nov 2020 16:04:01 -0000 1.287
+++ proprietary-surveillance.pot 19 Nov 2020 10:31:31 -0000 1.288
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -1165,6 +1165,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\">is
"
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html\">
"
"tells the cops directly</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.646
retrieving revision 1.647
diff -u -b -r1.646 -r1.647
--- proprietary-surveillance.ru.po 16 Nov 2020 18:02:21 -0000 1.646
+++ proprietary-surveillance.ru.po 19 Nov 2020 10:31:31 -0000 1.647
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1653,6 +1654,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Alipay Health Code app estimates whether the user has Covid-19 and <a "
"href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
"surveillance.html\"> tells the cops directly</a>."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary.de-diff.html 16 Nov 2020 16:04:02 -0000 1.190
+++ proprietary.de-diff.html 19 Nov 2020 10:31:31 -0000 1.191
@@ -127,16 +127,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -212,6 +212,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202011060">
<p>A new app published by Google <a
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
@@ -257,15 +267,6 @@
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
-
- <li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use the Windows operating system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -329,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:02 $
+$Date: 2020/11/19 10:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.de.po 16 Nov 2020 16:04:03 -0000 1.230
+++ proprietary.de.po 19 Nov 2020 10:31:31 -0000 1.231
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -516,16 +526,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- proprietary.es.po 17 Nov 2020 09:51:14 -0000 1.341
+++ proprietary.es.po 19 Nov 2020 10:31:32 -0000 1.342
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -319,6 +320,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -401,23 +412,6 @@
"es que es software libre, lo que significa que respeta la libertad del "
"usuario. Adicionalmente, ofrece más opciones."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">engaña a los usuarios para que "
-"creen una cuenta en su red</a> haciéndoles creer que eso es necesario para "
-"poder instalar y utilizar el sistema operativo Windows (que es software "
-"malicioso). La cuenta puede utilizarse para vigilancia y/o vulnerar los "
-"derechos de los usuarios de múltiples maneras, como convertir el software "
-"que han comprado en un producto por suscripción."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -497,3 +491,19 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-"
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+#~ "setup-now-prevents-local-account-creation/\">engaña a los usuarios para "
+#~ "que creen una cuenta en su red</a> haciéndoles creer que eso es necesario
"
+#~ "para poder instalar y utilizar el sistema operativo Windows (que es "
+#~ "software malicioso). La cuenta puede utilizarse para vigilancia y/o "
+#~ "vulnerar los derechos de los usuarios de múltiples maneras, como "
+#~ "convertir el software que han comprado en un producto por suscripción."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- proprietary.fr.po 17 Nov 2020 11:18:48 -0000 1.384
+++ proprietary.fr.po 19 Nov 2020 10:31:32 -0000 1.385
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-17 12:18+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -315,6 +316,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -398,23 +409,6 @@
"libertés numériques de l'utilisateur. En prime, ce jeu propose plus "
"d'options."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">piège les utilisateurs pour "
-"qu'ils créent un compte sur son réseau</a> afin de pouvoir utiliser le "
-"système d'exploitation Windows, qui est un maliciel. Ce compte peut être "
-"utilisé pour surveiller les gens ou violer leurs droits de diverses "
-"manières, par exemple en transformant les logiciels qu'ils ont achetés en "
-"produits vendus par abonnement."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -487,3 +481,19 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-"
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+#~ "setup-now-prevents-local-account-creation/\">piège les utilisateurs pour "
+#~ "qu'ils créent un compte sur son réseau</a> afin de pouvoir utiliser le "
+#~ "système d'exploitation Windows, qui est un maliciel. Ce compte peut être
"
+#~ "utilisé pour surveiller les gens ou violer leurs droits de diverses "
+#~ "manières, par exemple en transformant les logiciels qu'ils ont achetés
en "
+#~ "produits vendus par abonnement."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary.it-diff.html 16 Nov 2020 16:04:03 -0000 1.202
+++ proprietary.it-diff.html 19 Nov 2020 10:31:32 -0000 1.203
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,9 +57,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -70,8 +69,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -211,6 +211,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202011060">
<p>A new app published by Google <a
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
@@ -256,15 +266,6 @@
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
-
- <li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use the Windows operating system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -328,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.it.po 16 Nov 2020 16:04:03 -0000 1.239
+++ proprietary.it.po 19 Nov 2020 10:31:32 -0000 1.240
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -521,16 +531,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.ja-diff.html 16 Nov 2020 16:04:03 -0000 1.207
+++ proprietary.ja-diff.html 19 Nov 2020 10:31:32 -0000 1.208
@@ -56,14 +56,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -161,9 +161,9 @@
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
@@ -210,6 +210,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202011060">
<p>A new app published by Google <a
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
@@ -255,15 +265,6 @@
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
-
- <li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use the Windows operating system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -327,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary.ja.po 16 Nov 2020 16:04:03 -0000 1.223
+++ proprietary.ja.po 19 Nov 2020 10:31:32 -0000 1.224
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -379,16 +389,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.nl-diff.html 16 Nov 2020 16:04:03 -0000 1.203
+++ proprietary.nl-diff.html 19 Nov 2020 10:31:32 -0000 1.204
@@ -127,17 +127,17 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -211,6 +211,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202011060">
<p>A new app published by Google <a
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
@@ -256,15 +266,6 @@
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
-
- <li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use the Windows operating system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -328,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary.nl.po 16 Nov 2020 16:04:03 -0000 1.213
+++ proprietary.nl.po 19 Nov 2020 10:31:32 -0000 1.214
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -424,16 +434,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary.pl-diff.html 16 Nov 2020 16:04:03 -0000 1.220
+++ proprietary.pl-diff.html 19 Nov 2020 10:31:32 -0000 1.221
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -155,18 +155,18 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -210,6 +210,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202011060">
<p>A new app published by Google <a
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
@@ -255,15 +265,6 @@
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
-
- <li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use the Windows operating system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -327,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary.pl.po 16 Nov 2020 16:04:03 -0000 1.206
+++ proprietary.pl.po 19 Nov 2020 10:31:32 -0000 1.207
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -605,16 +615,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.pot 16 Nov 2020 16:04:03 -0000 1.203
+++ proprietary.pot 19 Nov 2020 10:31:32 -0000 1.204
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a "
+"href=\"https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account\">is
"
+"sending users' data to Facebook</a> even if the user doesn't have a Facebook "
+"account. According to the article, Zoom and Facebook don't even mention this "
+"surveillance on their privacy policy page, making this an obvious violation "
+"of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a "
"href=\"https://www.xda-developers.com/google-device-lock-controller-banks-payments/\">lets
"
"banks and creditors deactivate people's Android devices</a> if they fail to "
@@ -314,16 +324,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a "
-"href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/\">tricking
"
-"users to create an account on their network</a> to be able to install and "
-"use the Windows operating system, which is malware. The account can be used "
-"for surveillance and/or violating people's rights in many ways, such as "
-"turning their purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary.pt-br-diff.html 16 Nov 2020 16:04:03 -0000 1.12
+++ proprietary.pt-br-diff.html 19 Nov 2020 10:31:32 -0000 1.13
@@ -187,97 +187,94 @@
<ul class="blurbs">
<li <span class="removed"><del><strong>id="M202007010">
- <p>BMW will remotely</strong></del></span> <span
class="inserted"><ins><em>id="M202011060">
- <p>A new app published by Google</em></ins></span> <a
+ <p>BMW will remotely</strong></del></span> <span
class="inserted"><ins><em>id="M202003260">
+ <p>The Apple iOS version of Zoom</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
- enable</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
- banks</em></ins></span> and <span class="removed"><del><strong>disable
functionality in cars</a> through a universal
- back door.</p></strong></del></span> <span
class="inserted"><ins><em>creditors deactivate people's Android
devices</a> if they
- fail to make payments. If someone's device gets deactivated, it will
- be limited to basic functionality, such as emergency calling and
- access to settings.</p></em></ins></span>
+ enable and disable functionality in cars</a>
through</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't
have</em></ins></span>
+ a <span class="removed"><del><strong>universal
+ back door.</p>
</li>
- <li <span class="removed"><del><strong>id="M202006300">
- <p>“Bossware” is malware that
bosses</strong></del></span> <span class="inserted"><ins><em>id="M201905281">
- <p>Microsoft</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give</em></ins></span> their <span
class="removed"><del><strong>own computers</a>, so the
- bosses can spy</strong></del></span> <span class="inserted"><ins><em>phone
number</a> in order to be able to create an account</em></ins></span> on
<span class="removed"><del><strong>them.</p>
-
- <p>This shows why requiring</strong></del></span>
- the <span class="removed"><del><strong>user's
“consent”</strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
- nonfree software, Microsoft</em></ins></span> is <span
class="removed"><del><strong>not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable exposure
+ <li id="M202006300">
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>,
so</strong></del></span> <span class="inserted"><ins><em>Facebook account.
According to</em></ins></span> the
+ <span class="removed"><del><strong>bosses can spy</strong></del></span>
<span class="inserted"><ins><em>article, Zoom and Facebook
+ don't even mention this surveillance</em></ins></span> on <span
class="removed"><del><strong>them.</p>
+
+ <p>This shows why requiring the user's “consent” is
not</strong></del></span> <span class="inserted"><ins><em>their privacy policy
page,
+ making this</em></ins></span> an <span
class="removed"><del><strong>adequate basis for protecting digital privacy.
The boss can coerce
+ most workers into consenting to almost anything,</strong></del></span>
<span class="inserted"><ins><em>obvious violation of people's
privacy</em></ins></span> even <span class="removed"><del><strong>probable
exposure
to contagious disease that can be fatal. Software like this should
- be illegal</strong></del></span> <span class="inserted"><ins><em>tracking
their lives outside the computer</em></ins></span> and <span
class="removed"><del><strong>bosses that demand it should be prosecuted for
it.</p></strong></del></span>
- <span class="inserted"><ins><em>violates their
privacy.</p></em></ins></span>
+ be illegal</strong></del></span> <span class="inserted"><ins><em>in their
+ own terms.</p>
+ </li>
+
+ <li id="M202011060">
+ <p>A new app published by Google <a
+
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ banks</em></ins></span> and <span class="removed"><del><strong>bosses that
demand</strong></del></span> <span class="inserted"><ins><em>creditors
deactivate people's Android devices</a> if they
+ fail to make payments. If someone's device gets
deactivated,</em></ins></span> it <span
class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em>will</em></ins></span>
+ be <span class="removed"><del><strong>prosecuted for
it.</p></strong></del></span> <span class="inserted"><ins><em>limited to
basic functionality, such as emergency calling and
+ access to settings.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M201504210">
<p>Runescape is a popular online game with some <a
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/">
- addictive features</a> derived from <a
- href="/proprietary/proprietary-addictions.html#addictiveness">
+ addictive features</a> derived from</strong></del></span> <span
class="inserted"><ins><em>id="M201905281">
+ <p>Microsoft</em></ins></span> <a
+ <span
class="removed"><del><strong>href="/proprietary/proprietary-addictions.html#addictiveness">
behavioral manipulation techniques</a>. Certain
- repetitive aspects</strong></del></span> <span
class="inserted"><ins><em>id="M202006120">
- <p>The company behind Zoom does not only deny
- users' computer freedom by developing this piece</em></ins></span>
- of <span class="inserted"><ins><em>nonfree software, it also violates
users' civil rights by <a
-
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship">banning
- events and censoring users</a> to serve</em></ins></span> the <span
class="removed"><del><strong>game, like</strong></del></span> <span
class="inserted"><ins><em>agenda of governments.</p>
-
- <p>Freedom respecting programs such as</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
- grinding</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a>
or BigBlueButton</em></ins></span>
- can be <span class="removed"><del><strong>minimised by
becoming</strong></del></span> <span class="inserted"><ins><em>used instead,
better still if installed in</em></ins></span> a <span
class="removed"><del><strong>paying member, and can
- thus encourage children and impressionable people to spend money on
- the game.</p></strong></del></span> <span
class="inserted"><ins><em>server controlled
- by its users.</p></em></ins></span>
+ repetitive aspects of the game, like <a
+ href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
+ grinding</a>, can be minimised by becoming a paying member, and can
+ thus encourage children and impressionable</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces</em></ins></span>
+ people to <span class="removed"><del><strong>spend
money</strong></del></span> <span class="inserted"><ins><em>give their phone
number</a> in order to be able to create an account</em></ins></span> on
+ the <span
class="removed"><del><strong>game.</p></strong></del></span> <span
class="inserted"><ins><em>company's network. On top of mistreating their users
by providing
+ nonfree software, Microsoft is tracking their lives outside the computer
and
+ violates their privacy.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M202006260">
<p>Most apps are malware, but
- Trump's campaign app, like Modi's campaign app,</strong></del></span>
<span class="inserted"><ins><em>id="M202010221">
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong><a
+ Trump's campaign app, like Modi's campaign app, is <a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop</strong></del></span>
<span class="inserted"><ins><em>imposing its
- surveillance</em></ins></span> on <span class="removed"><del><strong>users
as well
- as snooping</strong></del></span> <span class="inserted"><ins><em>the game
of Minecraft by <a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open an account</em></ins></span> on <span
class="removed"><del><strong>them itself</a>.</p>
-
- <p>The article says that Biden's app</strong></del></span> <span
class="inserted"><ins><em>Microsoft's network</a>.
Microsoft</em></ins></span>
- has <span class="removed"><del><strong>a less manipulative overall
- approach, but</strong></del></span> <span class="inserted"><ins><em>bought
the game and will merge all accounts into its network,
- which will give them access to people's data.</p>
+ especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p></strong></del></span>
<span class="inserted"><ins><em>id="M202006120"></em></ins></span>
+ <p>The <span class="removed"><del><strong>article says that Biden's
app has a less manipulative overall
+ approach, but that</strong></del></span> <span
class="inserted"><ins><em>company behind Zoom</em></ins></span> does not <span
class="removed"><del><strong>tell us whether</strong></del></span> <span
class="inserted"><ins><em>only deny
+ users' computer freedom by developing this piece
+ of nonfree software,</em></ins></span> it <span
class="removed"><del><strong>has functionalities we
+ consider malicious,</strong></del></span> <span
class="inserted"><ins><em>also violates users' civil rights by <a
+
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship">banning
+ events and censoring users</a> to serve the agenda of
governments.</p>
- <p>Minecraft players <a
- href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>does not tell us
whether</strong></del></span> it <span class="removed"><del><strong>has
functionalities we
- consider malicious, such as sending data</strong></del></span> <span
class="inserted"><ins><em>is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>user has not explicitly
- asked to send.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
- it offers more options.</p></em></ins></span>
+ <p>Freedom respecting programs</em></ins></span> such as <span
class="removed"><del><strong>sending data the user has not explicitly
+ asked to send.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://directory.fsf.org/wiki/Jitsi">Jitsi</a> or
BigBlueButton
+ can be used instead, better still if installed in a server controlled
+ by its users.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="M202006250">
- <p>TV manufacturers are</strong></del></span> <span
class="inserted"><ins><em>id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to
be</em></ins></span> able to <span class="removed"><del><strong><a
-
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what</strong></del></span> <span
class="inserted"><ins><em>install
- and use</em></ins></span> the <span class="removed"><del><strong>user is
watching</a>. This</strong></del></span> <span
class="inserted"><ins><em>Windows operating system, which</em></ins></span> is
<span class="removed"><del><strong>illegal due</strong></del></span> <span
class="inserted"><ins><em>malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software</em></ins></span> to
- <span class="removed"><del><strong>the Video Privacy Protection Act of
1988, but they're circumventing
- it through EULAs.</p></strong></del></span> <span
class="inserted"><ins><em>a subscription product.</p></em></ins></span>
+ <p>TV manufacturers are able to</strong></del></span> <span
class="inserted"><ins><em>id="M202010221">
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
+ every <span class="removed"><del><strong>second of
what</strong></del></span> <span class="inserted"><ins><em>player to open an
account on Microsoft's network</a>. Microsoft
+ has bought</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest</em></ins></span> is <span
class="removed"><del><strong>watching</a>. This</strong></del></span>
<span class="inserted"><ins><em>that it</em></ins></span> is <span
class="removed"><del><strong>illegal due to</strong></del></span> <span
class="inserted"><ins><em>free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>Video Privacy Protection Act of 1988, but they're
circumventing</strong></del></span> <span class="inserted"><ins><em>user's
computer freedom. As a bonus,</em></ins></span>
+ it <span class="removed"><del><strong>through
EULAs.</p></strong></del></span> <span class="inserted"><ins><em>offers
more options.</p></em></ins></span>
</li>
</ul>
@@ -341,7 +338,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:03 $
+$Date: 2020/11/19 10:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.338
retrieving revision 1.339
diff -u -b -r1.338 -r1.339
--- proprietary.pt-br.po 16 Nov 2020 16:04:03 -0000 1.338
+++ proprietary.pt-br.po 19 Nov 2020 10:31:32 -0000 1.339
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-07-26 08:55-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -318,6 +318,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -369,16 +379,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.418
retrieving revision 1.419
diff -u -b -r1.418 -r1.419
--- proprietary.ru.po 16 Nov 2020 18:02:21 -0000 1.418
+++ proprietary.ru.po 19 Nov 2020 10:31:32 -0000 1.419
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +319,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -401,23 +412,6 @@
"в Ñом, ÑÑо ÑÑо ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма, а
знаÑиÑ, она ÑÐ²Ð°Ð¶Ð°ÐµÑ Ð²ÑÑиÑлиÑелÑнÑÑ "
"ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ. Ðдобавок в ней
болÑÑе наÑÑÑоек."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">обманом
заÑÑавлÑÐµÑ "
-"полÑзоваÑелей ÑоздаваÑÑ ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ Ð²
иÑ
ÑеÑи</a>, пеÑед Ñем как они "
-"ÑмогÑÑ ÑÑÑановиÑÑ Ð¸ полÑзоваÑÑÑÑ
опеÑаÑионной ÑиÑÑемой Windows, коÑоÑÐ°Ñ "
-"вÑедоноÑна. УÑеÑÐ½Ð°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ð¼Ð¾Ð¶ÐµÑ
пÑименÑÑÑÑÑ Ð´Ð»Ñ Ñлежки или наÑÑÑÐµÐ½Ð¸Ñ Ð¿Ñав "
-"Ñеловека ÑазнÑми ÑпоÑобами, напÑимеÑ,
обÑаÑением пÑиобÑеÑеннÑÑ
ими пÑогÑамм "
-"в пÑодÑкÑ, ÑабоÑаÑÑий по подпиÑке."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -494,6 +488,22 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-"
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+#~ "setup-now-prevents-local-account-creation/\">обманом
заÑÑавлÑÐµÑ "
+#~ "полÑзоваÑелей ÑоздаваÑÑ ÑÑеÑнÑÑ Ð·Ð°Ð¿Ð¸ÑÑ
в иÑ
ÑеÑи</a>, пеÑед Ñем как они "
+#~ "ÑмогÑÑ ÑÑÑановиÑÑ Ð¸ полÑзоваÑÑÑÑ
опеÑаÑионной ÑиÑÑемой Windows, коÑоÑÐ°Ñ "
+#~ "вÑедоноÑна. УÑеÑÐ½Ð°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ð¼Ð¾Ð¶ÐµÑ
пÑименÑÑÑÑÑ Ð´Ð»Ñ Ñлежки или наÑÑÑÐµÐ½Ð¸Ñ "
+#~ "пÑав Ñеловека ÑазнÑми ÑпоÑобами,
напÑимеÑ, обÑаÑением пÑиобÑеÑеннÑÑ
ими "
+#~ "пÑогÑамм в пÑодÑкÑ, ÑабоÑаÑÑий по
подпиÑке."
+
+#~ msgid ""
#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
#~ "over-the-world\">coerces players to spend money by overwhelming the game "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.tr.po 16 Nov 2020 16:04:03 -0000 1.76
+++ proprietary.tr.po 19 Nov 2020 10:31:32 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-14 14:39+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -314,6 +314,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -403,23 +413,6 @@
"yazılım olmasıdır, yani bilgisayar kullanıcılarının özgürlüÄüne
saygılıdır. "
"Bonus olarak daha fazla seçenek sunuyor."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"Microsoft, zaten kendisi kötücül bir yazılım olan Windows iÅletim
sistemini "
-"kurabilmeleri ve kullanabilmeleri için <a href=\"https://www.howtogeek."
-"com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"
-"\">kullanıcıları aÄlarında hesap açmaları için kandırıyor</a>. Bu
hesap, "
-"kiÅilerin gözetimi ve/veya haklarının çok çeÅitli biçimlerde ihlal
edilmesi "
-"için, örneÄin satın aldıkları bir ürünü abone olunmuÅ bir ürüne
dönüÅtürmek "
-"gibi, kullanılabilir."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,6 +494,22 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-"
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "Microsoft, zaten kendisi kötücül bir yazılım olan Windows iÅletim "
+#~ "sistemini kurabilmeleri ve kullanabilmeleri için <a href=\"https://www."
+#~ "howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-"
+#~ "account-creation/\">kullanıcıları aÄlarında hesap açmaları için "
+#~ "kandırıyor</a>. Bu hesap, kiÅilerin gözetimi ve/veya haklarının çok
"
+#~ "çeÅitli biçimlerde ihlal edilmesi için, örneÄin satın aldıkları
bir ürünü "
+#~ "abone olunmuÅ bir ürüne dönüÅtürmek gibi, kullanılabilir."
+
+#~ msgid ""
#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
#~ "over-the-world\">coerces players to spend money by overwhelming the game "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary.zh-cn.po 17 Nov 2020 10:00:05 -0000 1.88
+++ proprietary.zh-cn.po 19 Nov 2020 10:31:32 -0000 1.89
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-11-17 17:29+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-11-19 10:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -294,6 +295,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -368,20 +379,6 @@
"Minetest</a>ï¼èä¸ç¨éè¦ç© MinecraftãMinetest
çéè¦ä¼ç¹æ¯èªç±è½¯ä»¶ï¼è¿æå³ç"
"å®å°éç¨æ·ç计ç®èªç±ãæ¤å¤ï¼Minetest
è¿æä¾äºæ´å¤å¯é项ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-"微软 <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-setup-"
-"now-prevents-local-account-creation/\">欺éªç¨æ·å建ç½ç»è´¦å·</a>ï¼è¿æ
·å°±å¯ä»¥å®"
-"è£
åä½¿ç¨ Windows
æä½ç³»ç»ââä¸ä¸ªæ¶æ软件ãè¿ç§è´¦å·å¯ä»¥ç¨æ¥çæ§ç¨æ·å¹¶ä¸/æè
è¿"
-"æå¤ç§è¿å人们æå©çæ¹å¼ï¼æ¯å¦æ人们è´ä¹°ç软件åæ订é
ç软件ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -466,6 +463,20 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-"
+#~ "windows-10-setup-now-prevents-local-account-creation/\">tricking users to "
+#~ "create an account on their network</a> to be able to install and use the "
+#~ "Windows operating system, which is malware. The account can be used for "
+#~ "surveillance and/or violating people's rights in many ways, such as "
+#~ "turning their purchased software to a subscription product."
+#~ msgstr ""
+#~ "微软 <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
+#~
"setup-now-prevents-local-account-creation/\">欺éªç¨æ·å建ç½ç»è´¦å·</a>ï¼è¿"
+#~ "æ ·å°±å¯ä»¥å®è£
åä½¿ç¨ Windows
æä½ç³»ç»ââä¸ä¸ªæ¶æ软件ãè¿ç§è´¦å·å¯ä»¥ç¨æ¥çæ§ç¨"
+#~ "æ·å¹¶ä¸/æè
è¿æå¤ç§è¿å人们æå©çæ¹å¼ï¼æ¯å¦æ人们è´ä¹°ç软件åæ订é
ç软"
+#~ "件ã"
+
+#~ msgid ""
#~ "The addictive Genshin Impact relentlessly <a href=\"https://www."
#~ "theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-"
#~ "over-the-world\">coerces players to spend money by overwhelming the game "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary.zh-tw-diff.html 16 Nov 2020 16:04:04 -0000 1.183
+++ proprietary.zh-tw-diff.html 19 Nov 2020 10:31:32 -0000 1.184
@@ -127,16 +127,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -212,6 +212,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
+ own terms.</p>
+ </li>
+
<li id="M202011060">
<p>A new app published by Google <a
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
@@ -257,15 +267,6 @@
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
-
- <li id="M201912160">
- <p>Microsoft is <a
-
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking
- users to create an account on their network</a> to be able to install
- and use the Windows operating system, which is malware. The account can
- be used for surveillance and/or violating people's rights in many ways,
- such as turning their purchased software to a subscription
product.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -329,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/11/16 16:04:04 $
+$Date: 2020/11/19 10:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary.zh-tw.po 16 Nov 2020 16:04:04 -0000 1.193
+++ proprietary.zh-tw.po 19 Nov 2020 10:31:32 -0000 1.194
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-11-16 15:56+0000\n"
+"POT-Creation-Date: 2020-11-19 10:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A new app published by Google <a href=\"https://www.xda-developers.com/"
"google-device-lock-controller-banks-payments/\">lets banks and creditors "
"deactivate people's Android devices</a> if they fail to make payments. If "
@@ -494,16 +504,6 @@
"it offers more options."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Microsoft is <a href=\"https://www.howtogeek.com/442609/confirmed-windows-10-"
-"setup-now-prevents-local-account-creation/\">tricking users to create an "
-"account on their network</a> to be able to install and use the Windows "
-"operating system, which is malware. The account can be used for surveillance "
-"and/or violating people's rights in many ways, such as turning their "
-"purchased software to a subscription product."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- pt-br.po 16 Nov 2020 16:04:04 -0000 1.297
+++ pt-br.po 19 Nov 2020 10:31:32 -0000 1.298
@@ -4595,6 +4595,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.508
retrieving revision 1.509
diff -u -b -r1.508 -r1.509
--- ru.po 16 Nov 2020 18:29:59 -0000 1.508
+++ ru.po 19 Nov 2020 10:31:33 -0000 1.509
@@ -5627,6 +5627,16 @@
"еÑе лÑÑÑе, еÑли они ÑÑÑÐ°Ð½Ð¾Ð²Ð»ÐµÐ½Ñ Ð½Ð°
ÑеÑвеÑе, конÑÑолиÑÑемом его "
"полÑзоваÑелÑми."
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
msgid "Copyright © 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2020 Free Software Foundation, Inc."
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- tr.po 16 Nov 2020 16:04:05 -0000 1.81
+++ tr.po 19 Nov 2020 10:31:33 -0000 1.82
@@ -4095,6 +4095,16 @@
"\">Jitsi</a> veya BigBlueButton gibi programlar kullanılabilir, bunların "
"kullanıcılar tarafından denetlenen bir sunucuya kurulması en iyisidir."
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- zh-cn.po 16 Nov 2020 16:04:05 -0000 1.77
+++ zh-cn.po 19 Nov 2020 10:31:33 -0000 1.78
@@ -4017,6 +4017,16 @@
"a> æ BigBlueButton å¯ä»¥ä»£æ¿
Zoomï¼å¦æè½å¤ä½¿ç¨ç±ç¨æ·èªå·±æ§å¶çæå¡å¨å°±æ´å¥½"
"äºã"
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- zh-tw.po 16 Nov 2020 16:04:05 -0000 1.233
+++ zh-tw.po 19 Nov 2020 10:31:33 -0000 1.234
@@ -3998,6 +3998,16 @@
"installed in a server controlled by its users."
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The Apple iOS version of Zoom <a href=\"https://www.vice.com/en/article/"
+"k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-"
+"account\">is sending users' data to Facebook</a> even if the user doesn't "
+"have a Facebook account. According to the article, Zoom and Facebook don't "
+"even mention this surveillance on their privacy policy page, making this an "
+"obvious violation of people's privacy even in their own terms."
+msgstr ""
+
#. type: Content of: <div><p>
# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2020+} Free
# | Software Foundation, Inc.
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/02
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/16
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/11/25